[NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".
☆49Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for AdvFlow
Users that are interested in AdvFlow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆200Mar 27, 2023Updated 2 years ago
- Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks☆46Feb 24, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆48Feb 9, 2021Updated 5 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- We got a stew going!☆27Oct 3, 2023Updated 2 years ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆63Jan 14, 2020Updated 6 years ago
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆34Mar 8, 2021Updated 5 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆169Jul 2, 2020Updated 5 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Oct 20, 2021Updated 4 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- [NeurIPS'20 Oral] DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles☆55Feb 25, 2022Updated 4 years ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Feb 12, 2020Updated 6 years ago
- [AISTATS2020] The official repository of "Invertible Generative Modling using Linear Rational Splines (LRS)".☆20May 12, 2023Updated 2 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Code and checkpoints of compressed networks for the paper titled "HYDRA: Pruning Adversarially Robust Neural Networks" (NeurIPS 2020) (ht…☆90Dec 22, 2022Updated 3 years ago
- [ECCV 2020] Pytorch codes for Open-set Adversarial Defense☆21Mar 20, 2022Updated 4 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- Black-box Adversarial Attacks on Video Recognition Models. (VBAD)☆27Oct 28, 2019Updated 6 years ago
- ☆88Nov 2, 2021Updated 4 years ago
- On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them [NeurIPS 2020]☆35Jul 3, 2021Updated 4 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆98Dec 12, 2020Updated 5 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)☆56Nov 5, 2020Updated 5 years ago
- Smooth Adversarial Training☆68Nov 16, 2020Updated 5 years ago
- PatchAttack (ECCV 2020)☆65May 22, 2020Updated 5 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆153Oct 15, 2020Updated 5 years ago
- Semisupervised learning for adversarial robustness https://arxiv.org/pdf/1905.13736.pdf☆139Mar 30, 2020Updated 5 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago