lepoeme20 / Adversarial-Attacks
Reproduce multiple adversarial attack methods
☆22Updated 4 years ago
Related projects: ⓘ
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆33Updated last year
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆54Updated 5 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆23Updated last year
- ☆66Updated 3 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆34Updated last year
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆74Updated 3 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆81Updated 6 months ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆73Updated 2 years ago
- A paper list for localized adversarial patch research☆124Updated 8 months ago
- Adversarial Robustness, White-box, Adversarial Attack☆49Updated 2 years ago
- Paper list of Adversarial Examples☆42Updated 11 months ago
- Paper sharing in adversary related works☆43Updated 3 weeks ago
- Decision-based Adversarial Attack with Frequency Mixup☆20Updated last year
- Attacks Which Do Not Kill Training Make Adversarial Learning Stronger (ICML2020 Paper)☆124Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆24Updated last year
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆47Updated last year
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆14Updated 3 years ago
- ☆12Updated 4 years ago
- ☆41Updated last year
- ☆23Updated 3 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆23Updated 3 years ago
- ☆48Updated 2 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Updated last year
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆52Updated 3 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Updated last year
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆143Updated 3 years ago
- Revisiting Transferable Adversarial Images (arXiv)☆113Updated last month
- ☆31Updated 6 months ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆30Updated 2 years ago
- ☆32Updated last year