lepoeme20 / Adversarial-Attacks
Reproduce multiple adversarial attack methods
☆22Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Adversarial-Attacks
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆55Updated 5 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆35Updated last year
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆81Updated 8 months ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆33Updated last year
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Updated 2 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆76Updated last year
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆77Updated 2 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆91Updated 2 years ago
- ☆68Updated 3 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Updated last year
- ☆40Updated last year
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆77Updated 3 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆50Updated 2 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆113Updated last week
- Anti-Backdoor learning (NeurIPS 2021)☆78Updated last year
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆23Updated 2 years ago
- Pytorch implementation of Adversarial Patch on ImageNet (arXiv: https://arxiv.org/abs/1712.09665)☆55Updated 4 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆28Updated 4 months ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆50Updated 2 years ago
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆27Updated 3 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆24Updated 3 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆47Updated 2 years ago
- ☆48Updated 2 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆87Updated last year
- Code for "Label-Consistent Backdoor Attacks"☆49Updated 4 years ago
- A curated list of papers for the transferability of adversarial examples☆54Updated 4 months ago
- Boosting Transferability through Enhanced Momentum☆14Updated 8 months ago
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆41Updated 2 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Updated 4 years ago
- A paper list for localized adversarial patch research☆141Updated 10 months ago