Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"
☆24Jul 24, 2024Updated last year
Alternatives and similar repositories for AdvINN
Users that are interested in AdvINN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- ☆35Dec 16, 2022Updated 3 years ago
- Code and data for PAN and PAN-phys.☆14Mar 20, 2023Updated 3 years ago
- ☆12Jun 13, 2025Updated 10 months ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Official Code for Epsilon-Mesh Attack (IEEE FG 2024)☆17Nov 14, 2024Updated last year
- The MCG black-box attack framework published in TPAMI 2022☆38Jan 17, 2023Updated 3 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Cross-Modal Transferable Adversarial Attacks from Images to Videos (CVPR 2022)☆21Jul 3, 2024Updated last year
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆79Jan 13, 2022Updated 4 years ago
- Implementation of AAAI 2022 Paper: Context-Aware Transfer Attacks for Object Detection☆19Feb 28, 2022Updated 4 years ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆119Oct 31, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆263Nov 23, 2025Updated 5 months ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Aug 28, 2021Updated 4 years ago
- Implementation of the SWEVO paper: "Decentralised Aerial Swarm for Adaptive and Energy Efficient Transport of Unknown Loads".☆14May 9, 2023Updated 2 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆30Aug 24, 2021Updated 4 years ago
- SAGA: Spectral Adversarial Geometric Attack on 3D Meshes (ICCV 2023)☆25Sep 25, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A package that achieves 95%+ transfer attack success rate against GPT-4☆26Oct 24, 2024Updated last year
- [ICCV 2023] Towards Building More Robust Models with Frequency Bias☆20Feb 27, 2024Updated 2 years ago
- The official PyTorch implementations for Latent-HSJA.☆29Nov 3, 2023Updated 2 years ago
- Official implementation of the paper "GANprintR: Improved Fakes and Evaluation of the State-of-the-Art in Face Manipulation Detection"☆25Apr 17, 2020Updated 6 years ago
- ☆14Mar 23, 2023Updated 3 years ago
- ☆13Aug 26, 2024Updated last year
- Deepfake detection☆23Sep 13, 2021Updated 4 years ago
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆46Jan 24, 2024Updated 2 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆28Aug 17, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated 2 years ago
- ☆13Mar 3, 2025Updated last year
- A Leaderboard for Certifiable Robustness against Adversarial Patch Attacks☆20Oct 30, 2023Updated 2 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆117Jul 21, 2022Updated 3 years ago
- This is the official repository for the ECCV 2022 paper "RepMix: Representation Mixing for Robust Attribution of Synthesized Images"☆21Jul 22, 2022Updated 3 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆43Nov 8, 2020Updated 5 years ago
- 2022年华为软件精英赛初赛☆11Apr 2, 2022Updated 4 years ago