lhaof / Adversarial-Attack-Papers
☆13Updated 5 years ago
Alternatives and similar repositories for Adversarial-Attack-Papers:
Users that are interested in Adversarial-Attack-Papers are comparing it to the libraries listed below
- ☆46Updated 3 years ago
- ☆35Updated 4 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆59Updated 5 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Updated 4 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Updated 4 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Updated 6 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 5 years ago
- CAAD 2018 winning submissions☆34Updated 5 years ago
- Implementation for Jacobian Adversarially Regularized Networks for Robustness (ICLR 2020)☆21Updated 5 years ago
- Code for the NeurIPS 2019 submission: "Improving Black-box Adversarial Attacks with a Transfer-based Prior".☆16Updated 4 years ago
- Further improve robustness of mixup-trained models in inference (ICLR 2020)☆60Updated 4 years ago
- ☆25Updated 5 years ago
- Smooth Adversarial Training☆67Updated 4 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- ☆18Updated 5 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆83Updated 5 years ago
- An Algorithm to Quantify Robustness of Recurrent Neural Networks☆47Updated 4 years ago
- Implementation for What it Thinks is Important is Important: Robustness Transfers through Input Gradients (CVPR 2020 Oral)☆16Updated last year
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆28Updated 2 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 6 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 6 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- Codebase for "Exploring the Landscape of Spatial Robustness" (ICML'19, https://arxiv.org/abs/1712.02779).☆26Updated 5 years ago
- Robustness vs Accuracy Survey on ImageNet☆99Updated 3 years ago
- Project page for our paper: Interpreting Adversarially Trained Convolutional Neural Networks☆65Updated 5 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 2 years ago
- Generalized Data-free Universal Adversarial Perturbations☆69Updated 6 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆27Updated 6 years ago
- ☆19Updated 3 years ago
- Knowledge Distillation with Adversarial Samples Supporting Decision Boundary (AAAI 2019)☆70Updated 5 years ago