lhaof / Adversarial-Attack-Papers
☆13Updated 5 years ago
Alternatives and similar repositories for Adversarial-Attack-Papers:
Users that are interested in Adversarial-Attack-Papers are comparing it to the libraries listed below
- ☆48Updated 4 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Updated 6 years ago
- ☆35Updated 4 years ago
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆29Updated 3 years ago
- Smooth Adversarial Training☆67Updated 4 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 6 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Updated 5 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Updated 4 years ago
- ☆19Updated 3 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 6 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆59Updated 6 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 6 years ago
- ☆45Updated 5 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Updated 6 years ago
- StrAttack, ICLR 2019☆33Updated 5 years ago
- Further improve robustness of mixup-trained models in inference (ICLR 2020)☆60Updated 4 years ago
- ☆25Updated 5 years ago
- ☆18Updated 5 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆45Updated 3 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- CAAD 2018 winning submissions☆35Updated 6 years ago
- Show-and-Fool: Adversarial Examples for Image Captioning task☆55Updated 3 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Updated 7 years ago
- Code for the paper "MMA Training: Direct Input Space Margin Maximization through Adversarial Training"☆34Updated 5 years ago
- Robustness vs Accuracy Survey on ImageNet☆98Updated 3 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- Implementation for What it Thinks is Important is Important: Robustness Transfers through Input Gradients (CVPR 2020 Oral)☆16Updated 2 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆31Updated 2 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆73Updated 10 months ago
- Codebase for "Exploring the Landscape of Spatial Robustness" (ICML'19, https://arxiv.org/abs/1712.02779).☆26Updated 5 years ago