Code for Adversarial Example Games NeurIPS 2020 Paper
☆27Nov 27, 2024Updated last year
Alternatives and similar repositories for Adversarial-Example-Games
Users that are interested in Adversarial-Example-Games are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆48Feb 9, 2021Updated 5 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Aug 18, 2020Updated 5 years ago
- Targeted black-box adversarial attack using Bayesian Optimization☆38Jun 14, 2020Updated 5 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆19Jul 20, 2021Updated 4 years ago
- ☆10Feb 28, 2019Updated 7 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Dec 5, 2020Updated 5 years ago
- [ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning☆31Dec 2, 2023Updated 2 years ago
- Source files for the 2020 ICAPS Online Summer School Lab on Plan Execution.☆11Oct 16, 2020Updated 5 years ago
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 8 months ago
- Code accompanying the paper "TiZero: Mastering Multi-Agent Football with Curriculum Learning and Self-Play" (AAMAS 2023) 足球游戏智能体☆14May 25, 2023Updated 2 years ago
- An implementation of the Conflict-Based Search, written in Python 3. This project, however, will support weighted edges and uncertainty r…☆11Jun 13, 2020Updated 5 years ago
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- ☆19Mar 26, 2022Updated 4 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago
- ☆12Mar 15, 2019Updated 7 years ago
- Implementation of Confidence-Calibrated Adversarial Training (CCAT).☆45Aug 3, 2020Updated 5 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Nov 17, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Code that translates grammar into PDDL, runs a planner to produce multiple plans, translates plans into trainable lale pipelines and trai…☆18Sep 17, 2025Updated 8 months ago
- Code for ICML2019 Paper "On the Convergence and Robustness of Adversarial Training"☆34Apr 28, 2020Updated 6 years ago
- Landmark-Based Approaches for Goal Recognition as Planning.☆14Oct 17, 2025Updated 7 months ago
- Code for the paper: Kernel Distributionally Robust Optimization☆13Feb 21, 2021Updated 5 years ago
- Tensorflow Implementation of adversarial learning based adversarial example generator☆10Jan 31, 2018Updated 8 years ago
- ☆32Jul 10, 2023Updated 2 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆71Nov 17, 2020Updated 5 years ago
- ☆20May 22, 2023Updated 3 years ago
- A deep reinforcement learning multi-agent algorithm, where a team learns to complete a task and communicate between agents.☆16Jun 1, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆21Apr 25, 2023Updated 3 years ago
- Repository of our accepted NeurIPS-2022 paper "Towards Versatile Embodied Navigation"☆22Dec 8, 2022Updated 3 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆29Jun 27, 2022Updated 3 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- Code for the AAAI 2024 paper: "AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack" (accepted).☆12Mar 28, 2024Updated 2 years ago