huitailangyz / MGAAView external linksLinks
The code of ICCV2021 paper "Meta Gradient Adversarial Attack"
☆26Dec 11, 2021Updated 4 years ago
Alternatives and similar repositories for MGAA
Users that are interested in MGAA are comparing it to the libraries listed below
Sorting:
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated last year
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- Official PyTorch Implementaion of Generative Perturbation Network for Signal-Agnostic/Specific Adversarial Attacks on EEG-based Brain-Com…☆16Dec 6, 2022Updated 3 years ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Feb 15, 2022Updated 4 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆17Jul 19, 2022Updated 3 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated 11 months ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- Official Source Code of "Exploring Effective Data for Surrogate Training Towards Black-box Attack" and "STDatav2: Accessing Efficient Bla…☆20Apr 16, 2025Updated 10 months ago
- ☆43May 21, 2020Updated 5 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated last year
- Official implement of paper: Stable Diffusion is Unstable☆23May 21, 2024Updated last year
- ☆22Dec 12, 2022Updated 3 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Jan 25, 2022Updated 4 years ago
- ☆35Dec 16, 2022Updated 3 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Dec 26, 2019Updated 6 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆35Mar 29, 2023Updated 2 years ago
- 这是朴素贝叶斯的代码实现 包括三种模型 高斯模型 多项式模型 伯努利模型☆10Mar 7, 2018Updated 7 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 4 years ago
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 10 months ago
- ☆14Aug 12, 2024Updated last year
- ☆36Feb 23, 2024Updated last year
- [TIP-2017] Official MATLAB implementation of the "ESIM: Edge Similarity for Screen Content Image Quality Assessment"☆11Jul 8, 2025Updated 7 months ago
- EMG feature calculator for putEMG dataset☆10Jan 8, 2020Updated 6 years ago
- ☆41Mar 11, 2022Updated 3 years ago
- Unofficial PyTorch implementation of the paper "Generating images with sparse representations"☆38Mar 15, 2021Updated 4 years ago
- Official PyTorch implementation for Revisiting LRP: Positional Attribution as the Missing Ingredient for Transformer Explainability [Neur…☆13Jul 7, 2025Updated 7 months ago
- Reproduce the paper Distributed Representations of Sentences and Documents in tensorflow☆14Apr 8, 2017Updated 8 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- DeepSAVA: Sparse Adversarial Video Attacks with Spatial Transformations - BMVC 2021 & Neural Networks (2023)☆11Dec 13, 2024Updated last year
- ☆12Sep 22, 2023Updated 2 years ago
- ☆10May 14, 2023Updated 2 years ago
- Official release of code for the paper RL is a hammer and LLMs are nails A simple RL approach to stronger prompt injection attacks☆39Updated this week
- Implementation of Boundary Attributions for Normal (Vector) Explanations☆11Aug 13, 2021Updated 4 years ago