☆19Mar 19, 2023Updated 3 years ago
Alternatives and similar repositories for preprocessor-aware-black-box-attack
Users that are interested in preprocessor-aware-black-box-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for a research paper "Part-Based Models Improve Adversarial Robustness" (ICLR 2023)☆20Sep 16, 2023Updated 2 years ago
- ☆15Jul 24, 2022Updated 3 years ago
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- Tensorflow implementation of Meta Adversarial Training for Adversarial Patch Attacks on Tiny ImageNet.☆26Jan 28, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Official Code for Efficient and Effective Augmentation Strategy for Adversarial Training (NeurIPS-2022)☆17Mar 29, 2023Updated 3 years ago
- ☆23Apr 10, 2023Updated 3 years ago
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- ☆20Sep 13, 2021Updated 4 years ago
- ☆20Feb 13, 2020Updated 6 years ago
- Code for the paper "A Light Recipe to Train Robust Vision Transformers" [SaTML 2023]☆54Feb 6, 2023Updated 3 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆36Mar 16, 2022Updated 4 years ago
- Certified Patch Robustness via Smoothed Vision Transformers☆42Dec 17, 2021Updated 4 years ago
- ☆65Jan 6, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆14Jun 25, 2022Updated 3 years ago
- ☆25Nov 14, 2022Updated 3 years ago
- Code-Implementation-of-Super-Resolution-ZOO (image & video)☆10Jul 6, 2020Updated 5 years ago
- Code and data to go with the Zhu et al. paper "An Objective for Nuanced LLM Jailbreaks"☆37Apr 8, 2026Updated last month
- Implementation and evaluation of Almanac (Automaton/Logic Multi-Agent Natural Actor-Critic), an algorithm for multi-agent reinforcement l…☆10May 5, 2022Updated 4 years ago
- A Logisim schematic for a CPU that implements the Brainfuck language.☆10Mar 9, 2018Updated 8 years ago
- A Self-Consistent Robust Error (ICML 2022)☆68Jun 25, 2023Updated 2 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆26Dec 23, 2020Updated 5 years ago
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Creative Instructions Project☆11Sep 4, 2023Updated 2 years ago
- Policy Transfer across Visual and Dynamics Domain Gaps via Iterative Grounding (RSS 2021)☆12Oct 22, 2021Updated 4 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆18Sep 16, 2025Updated 8 months ago
- ☆12Apr 25, 2025Updated last year
- ☆12Nov 16, 2020Updated 5 years ago
- Category Theory for Quantum Natural Language Processing☆11Feb 22, 2023Updated 3 years ago
- ☆45Dec 13, 2023Updated 2 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- ☆17Aug 11, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- Code for FAB-attack☆33Jul 10, 2020Updated 5 years ago
- ☆52May 24, 2023Updated 2 years ago
- This repo provides DeOldify model for image colorization using OpenMMLab.☆10Nov 17, 2021Updated 4 years ago
- This repository accompanies the following paper: A Workflow for Offline Model-Free Robotic RL☆13Nov 5, 2021Updated 4 years ago
- The MCG black-box attack framework published in TPAMI 2022☆38Jan 17, 2023Updated 3 years ago