The code of ICCV2021 paper "Meta Gradient Adversarial Attack"
☆26Dec 11, 2021Updated 4 years ago
Alternatives and similar repositories for MGAA
Users that are interested in MGAA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆79Jan 13, 2022Updated 4 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The MCG black-box attack framework published in TPAMI 2022☆38Jan 17, 2023Updated 3 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- ☆43May 21, 2020Updated 5 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated 2 years ago
- TIFS2022: Decision-based Adversarial Attack with Frequency Mixup☆22Aug 8, 2023Updated 2 years ago
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆23Dec 27, 2020Updated 5 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆16Feb 15, 2022Updated 4 years ago
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated last year
- Official Source Code of "Exploring Effective Data for Surrogate Training Towards Black-box Attack" and "STDatav2: Accessing Efficient Bla…☆21Apr 16, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 东华大学 LaTeX 论文模板 | Donghua University LaTeX Thesis Template☆11Apr 17, 2024Updated 2 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆16Jul 19, 2022Updated 3 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- Official implement of paper: Stable Diffusion is Unstable☆22May 21, 2024Updated last year
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆20Aug 30, 2022Updated 3 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Jan 25, 2022Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- Implementation of BapFL: You can Backdoor Attack Personalized Federated Learning☆15Sep 18, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Adversarial attack and defense strategies for deep speaker recognition systems☆41Feb 18, 2021Updated 5 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- ☆37Jul 3, 2024Updated last year
- Experiments on Data Poisoning Regression Learning☆12Oct 5, 2020Updated 5 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- ☆13Nov 16, 2020Updated 5 years ago
- acnn for text-independent speaker recognition☆10Feb 8, 2022Updated 4 years ago
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 4 years ago
- FedAvg, FedGKT, FedProx, Gradient Inversion Attack☆16Feb 17, 2023Updated 3 years ago
- Program Analysis, Software Verification & Testing. Python3, CAS, Dafny, Z3, CVC4, UCLID, ZChaff, NuSMV, AFL, Scala, CBMC & LLVM Framework…☆41Apr 9, 2023Updated 3 years ago
- 3D-LMVIC: Learning-based Multi-View Image Coding with 3D Gaussian Geometric Priors☆11Jun 19, 2025Updated 10 months ago
- Official repository for Targeted Unlearning with Single Layer Unlearning Gradient (SLUG), ICML 2025☆17Aug 10, 2025Updated 8 months ago
- Code and data for EMNLP 2023 paper "Grounding Visual Illusions in Language: Do Vision-Language Models Perceive Illusions Like Humans?"☆15Jan 25, 2024Updated 2 years ago
- ☆14Apr 18, 2022Updated 4 years ago