lhaof / Adversarial-Attack-PapersLinks
☆13Updated 6 years ago
Alternatives and similar repositories for Adversarial-Attack-Papers
Users that are interested in Adversarial-Attack-Papers are comparing it to the libraries listed below
Sorting:
- ☆48Updated 4 years ago
- ☆35Updated 4 years ago
- Smooth Adversarial Training☆67Updated 4 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Updated 6 years ago
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆29Updated 3 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 7 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆47Updated 4 years ago
- Code for the paper "MMA Training: Direct Input Space Margin Maximization through Adversarial Training"☆34Updated 5 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 6 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆28Updated 6 years ago
- Further improve robustness of mixup-trained models in inference (ICLR 2020)☆60Updated 5 years ago
- ☆19Updated 4 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- Pre-Training Buys Better Robustness and Uncertainty Estimates (ICML 2019)☆100Updated 3 years ago
- Implementation for What it Thinks is Important is Important: Robustness Transfers through Input Gradients (CVPR 2020 Oral)☆16Updated 2 years ago
- Code for the NeurIPS 2019 submission: "Improving Black-box Adversarial Attacks with a Transfer-based Prior".☆16Updated 5 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆74Updated last year
- ☆46Updated 5 years ago
- Project page for our paper: Interpreting Adversarially Trained Convolutional Neural Networks☆66Updated 6 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆57Updated 6 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Updated 5 years ago
- Robustness vs Accuracy Survey on ImageNet☆98Updated 4 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 2 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 5 years ago
- Code for NeurIPS 2019 Paper☆47Updated 5 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 7 years ago
- Pytorch implementation of NPAttack☆12Updated 5 years ago
- StrAttack, ICLR 2019☆33Updated 6 years ago
- Pytorch implementation of Adversarially Robust Distillation (ARD)☆59Updated 6 years ago