kyleliang919 / Uncovering-the-Connections-BetweenAdversarial-Transferability-and-Knowledge-TransferabilityView on GitHub
code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.
☆17Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Uncovering-the-Connections-BetweenAdversarial-Transferability-and-Knowledge-Transferability
Users that are interested in Uncovering-the-Connections-BetweenAdversarial-Transferability-and-Knowledge-Transferability are comparing it to the libraries listed below
Sorting:
- ☆22Apr 15, 2022Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆30Feb 1, 2022Updated 4 years ago
- ☆16Dec 4, 2019Updated 6 years ago
- On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them [NeurIPS 2020]☆36Jul 3, 2021Updated 4 years ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆40Aug 28, 2022Updated 3 years ago
- ImageNet-CoG is a benchmark for concept generalization. It provides a full evaluation framework for pre-trained visual representations wh…☆26Oct 13, 2021Updated 4 years ago
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated 11 months ago
- ☆47Oct 19, 2021Updated 4 years ago
- https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/☆20May 9, 2022Updated 3 years ago
- Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021☆19Dec 6, 2021Updated 4 years ago
- ☆22Sep 13, 2021Updated 4 years ago
- Getting Starting with NIMBUS-CORE☆10Dec 16, 2023Updated 2 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Feb 10, 2023Updated 3 years ago
- ☆26Feb 27, 2022Updated 4 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- ☆28Oct 14, 2021Updated 4 years ago
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Jan 7, 2022Updated 4 years ago
- ☆30Feb 17, 2022Updated 4 years ago
- Code associated with the paper **Fine-tuning Language Models over Slow Networks using Activation Compression with Guarantees**.☆28Apr 25, 2023Updated 2 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- [NeurIPS 2021] A Geometric Analysis of Neural Collapse with Unconstrained Features☆61Jul 19, 2022Updated 3 years ago
- Code for the ICML 2021 paper "Bridging Multi-Task Learning and Meta-Learning: Towards Efficient Training and Effective Adaptation", Haoxi…☆68Oct 18, 2021Updated 4 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- ☆25Nov 21, 2020Updated 5 years ago
- Empirical tricks for training robust models (ICLR 2021)☆258May 25, 2023Updated 2 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Dec 7, 2024Updated last year
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Jun 15, 2022Updated 3 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Apr 22, 2022Updated 3 years ago
- Adversarial Defense for Ensemble Models (ICML 2019)☆61Nov 28, 2020Updated 5 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Nov 17, 2020Updated 5 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Dec 26, 2019Updated 6 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆76Apr 1, 2024Updated last year
- [ICML 2024] Safety Fine-Tuning at (Almost) No Cost: A Baseline for Vision Large Language Models.☆85Jan 19, 2025Updated last year
- ☆10Sep 29, 2023Updated 2 years ago
- Boost hardware utilization for ML training workloads via Inter-model Horizontal Fusion☆32May 15, 2024Updated last year
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago