lhaof / Adversarial-Attack-Papers
☆13Updated 5 years ago
Alternatives and similar repositories for Adversarial-Attack-Papers:
Users that are interested in Adversarial-Attack-Papers are comparing it to the libraries listed below
- ☆47Updated 4 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Updated 6 years ago
- CAAD 2018 winning submissions☆35Updated 6 years ago
- Code for the paper "MMA Training: Direct Input Space Margin Maximization through Adversarial Training"☆34Updated 4 years ago
- ☆35Updated 4 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 5 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆59Updated 5 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 6 years ago
- Smooth Adversarial Training☆67Updated 4 years ago
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆28Updated 2 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Updated 5 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆83Updated 5 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Updated 4 years ago
- StrAttack, ICLR 2019☆32Updated 5 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Updated 5 years ago
- Adversarial Defense for Ensemble Models (ICML 2019)☆61Updated 4 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆27Updated 6 years ago
- Codebase for "Exploring the Landscape of Spatial Robustness" (ICML'19, https://arxiv.org/abs/1712.02779).☆26Updated 5 years ago
- ☆18Updated 5 years ago
- ☆19Updated 3 years ago
- ☆45Updated 5 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 6 years ago
- Pre-Training Buys Better Robustness and Uncertainty Estimates (ICML 2019)☆100Updated 2 years ago
- Implementation for What it Thinks is Important is Important: Robustness Transfers through Input Gradients (CVPR 2020 Oral)☆16Updated last year
- Logit Pairing Methods Can Fool Gradient-Based Attacks [NeurIPS 2018 Workshop on Security in Machine Learning]☆19Updated 6 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆45Updated 3 years ago
- Code for the NeurIPS 2019 submission: "Improving Black-box Adversarial Attacks with a Transfer-based Prior".☆16Updated 4 years ago
- Implementation of our NeurIPS 2018 paper: Deep Defense: Training DNNs with Improved Adversarial Robustness☆39Updated 6 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago