jeromerony / adversarial-library
Library containing PyTorch implementations of various adversarial attacks and resources
☆151Updated last month
Alternatives and similar repositories for adversarial-library:
Users that are interested in adversarial-library are comparing it to the libraries listed below
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆210Updated 2 years ago
- Attacks Which Do Not Kill Training Make Adversarial Learning Stronger (ICML2020 Paper)☆125Updated last year
- Revisiting Transferable Adversarial Images (arXiv)☆122Updated 3 weeks ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- A unified benchmark problem for data poisoning attacks☆153Updated last year
- This repository provides simple PyTorch implementations for adversarial training methods on CIFAR-10.☆163Updated 4 years ago
- A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"☆153Updated 5 years ago
- This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks…☆121Updated 3 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆146Updated 4 years ago
- Empirical tricks for training robust models (ICLR 2021)☆251Updated last year
- ☆100Updated 11 months ago
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆162Updated 8 months ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆71Updated last year
- ☆85Updated 4 years ago
- Unofficial implementation of the DeepMind papers "Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples…☆95Updated 3 years ago
- ☆64Updated last year
- A paper list for localized adversarial patch research☆148Updated last year
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆71Updated 4 years ago
- ☆80Updated 3 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆86Updated last year
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Updated 4 years ago
- ☆51Updated 3 years ago
- Paper sharing in adversary related works☆45Updated last month
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆135Updated last year
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆441Updated 8 months ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆121Updated 4 months ago
- ☆47Updated 7 months ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆85Updated 3 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆54Updated 2 years ago
- Code for the paper "On the Adversarial Robustness of Visual Transformers"☆56Updated 3 years ago