The code of ICCV2021 paper "Meta Gradient Adversarial Attack"
☆26Dec 11, 2021Updated 4 years ago
Alternatives and similar repositories for MGAA
Users that are interested in MGAA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Dec 5, 2020Updated 5 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- Official PyTorch Implementaion of Generative Perturbation Network for Signal-Agnostic/Specific Adversarial Attacks on EEG-based Brain-Com…☆16Dec 6, 2022Updated 3 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated 2 years ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Aug 3, 2022Updated 3 years ago
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated last year
- Official Source Code of "Exploring Effective Data for Surrogate Training Towards Black-box Attack" and "STDatav2: Accessing Efficient Bla…☆21Apr 16, 2025Updated 11 months ago
- 东华大学 LaTeX 论文模板 | Donghua University LaTeX Thesis Template☆11Apr 17, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- Official implement of paper: Stable Diffusion is Unstable☆22May 21, 2024Updated last year
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- Implementation of BapFL: You can Backdoor Attack Personalized Federated Learning☆15Sep 18, 2023Updated 2 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- ☆37Jul 3, 2024Updated last year
- Experiments on Data Poisoning Regression Learning☆12Oct 5, 2020Updated 5 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆13Nov 16, 2020Updated 5 years ago
- acnn for text-independent speaker recognition☆10Feb 8, 2022Updated 4 years ago
- Official release of code for the paper RL is a hammer and LLMs are nails A simple RL approach to stronger prompt injection attacks☆42Feb 11, 2026Updated last month
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 4 years ago
- Predicting Political Instability and Social Conflicts Using Multimodal Data☆10Jun 6, 2016Updated 9 years ago
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Mar 3, 2026Updated 3 weeks ago
- Code and data for EMNLP 2023 paper "Grounding Visual Illusions in Language: Do Vision-Language Models Perceive Illusions Like Humans?"☆15Jan 25, 2024Updated 2 years ago
- ☆16May 26, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pytorch implementation of RNN, CNN, BiGRU and LSTM for text classifcation☆10Apr 30, 2021Updated 4 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆35Mar 29, 2023Updated 3 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Mar 17, 2021Updated 5 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- ☆35Dec 16, 2022Updated 3 years ago