[NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".
☆49Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for AdvFlow
Users that are interested in AdvFlow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks☆45Feb 24, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆48Feb 9, 2021Updated 5 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- ☆29Jun 27, 2022Updated 3 years ago
- We got a stew going!☆27Oct 3, 2023Updated 2 years ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆64Jan 14, 2020Updated 6 years ago
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆34Mar 8, 2021Updated 5 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆170Jul 2, 2020Updated 5 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Oct 20, 2021Updated 4 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- [NeurIPS'20 Oral] DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles☆55Feb 25, 2022Updated 4 years ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Feb 12, 2020Updated 6 years ago
- [AISTATS2020] The official repository of "Invertible Generative Modling using Linear Rational Splines (LRS)".☆20May 12, 2023Updated 2 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆524Oct 15, 2023Updated 2 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code and checkpoints of compressed networks for the paper titled "HYDRA: Pruning Adversarially Robust Neural Networks" (NeurIPS 2020) (ht…☆90Dec 22, 2022Updated 3 years ago
- [ECCV 2020] Pytorch codes for Open-set Adversarial Defense☆21Mar 20, 2022Updated 4 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- Black-box Adversarial Attacks on Video Recognition Models. (VBAD)☆27Oct 28, 2019Updated 6 years ago
- ☆87Nov 2, 2021Updated 4 years ago
- On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them [NeurIPS 2020]☆35Jul 3, 2021Updated 4 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Dec 12, 2020Updated 5 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)☆56Nov 5, 2020Updated 5 years ago
- Smooth Adversarial Training☆68Nov 16, 2020Updated 5 years ago
- PatchAttack (ECCV 2020)☆65May 22, 2020Updated 5 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆152Oct 15, 2020Updated 5 years ago
- Semisupervised learning for adversarial robustness https://arxiv.org/pdf/1905.13736.pdf☆140Mar 30, 2020Updated 6 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago