jiangyangzhou / Non-targeted-Attack-IJCAI2019-ColdRiverLinks
No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))
☆11Updated 4 years ago
Alternatives and similar repositories for Non-targeted-Attack-IJCAI2019-ColdRiver
Users that are interested in Non-targeted-Attack-IJCAI2019-ColdRiver are comparing it to the libraries listed below
Sorting:
- Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》☆30Updated 5 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 6 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 6 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60Updated 6 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆15Updated 5 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Updated 6 years ago
- ☆37Updated 4 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Updated 2 years ago
- Robustness vs Accuracy Survey on ImageNet☆98Updated 3 years ago
- CAAD 2018 winning submissions☆35Updated 6 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆123Updated 7 years ago
- [ICCV'19] Improving Adversarial Robustness via Guided Complement Entropy☆40Updated 5 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 7 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆33Updated 5 years ago
- A fast sparse attack on deep neural networks.☆50Updated 4 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆36Updated 4 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Updated 5 years ago
- This is a pytorch implementation of the CVPR2020 paper: Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-id…☆97Updated 4 years ago
- This project is the Torch implementation of our accepted CVPR 2019 paper, Iterative Normalization: Beyond Standardization towards Effic…☆25Updated 4 years ago
- The code of "Adversarial Metric Attack for Person Re-identification"☆32Updated 6 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆164Updated 6 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Updated last year
- ☆66Updated 7 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆85Updated 6 years ago
- Learnable Embedding Space for Efficient Neural Architecture Compression☆29Updated 6 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆45Updated 4 years ago
- Code for "Adversarial Noise Layer: Regularize Neural Network By Adding Noise"☆16Updated last year
- An implementation of Support Vector Guided Softmax Loss for Face Recognition☆22Updated 6 years ago
- Targeted Mismatch Adversarial Attack☆17Updated 5 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Updated 3 years ago