liuye6666 / EWR-PGDView external linksLinks
white box adversarial attack
☆37Jan 30, 2021Updated 5 years ago
Alternatives and similar repositories for EWR-PGD
Users that are interested in EWR-PGD are comparing it to the libraries listed below
Sorting:
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆52Nov 2, 2020Updated 5 years ago
- Grid Patch Attack for Object Detection☆43Mar 31, 2022Updated 3 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆27Dec 23, 2020Updated 5 years ago
- Code for FAB-attack☆34Jul 10, 2020Updated 5 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆552Mar 30, 2023Updated 2 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆142Aug 23, 2023Updated 2 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Apr 1, 2024Updated last year
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Dec 26, 2019Updated 6 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆52Jul 6, 2022Updated 3 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 2 years ago
- ☆71May 18, 2021Updated 4 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆36Mar 14, 2021Updated 4 years ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆30Feb 1, 2022Updated 4 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Mar 25, 2023Updated 2 years ago
- Official release of code for the paper RL is a hammer and LLMs are nails A simple RL approach to stronger prompt injection attacks☆39Updated this week
- Adversarial attack to detectors☆46Oct 23, 2021Updated 4 years ago
- Adversarial Distributional Training (NeurIPS 2020)☆63Mar 17, 2021Updated 4 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆252Oct 30, 2019Updated 6 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- Code for the ICCV 2021 paper "Augmented Lagrangian Adversarial Attacks"☆24Mar 28, 2024Updated last year
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆738May 16, 2024Updated last year
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 3 years ago
- ☆20Jun 10, 2020Updated 5 years ago
- [ICLR 2021] "Robust Overfitting may be mitigated by properly learned smoothening" by Tianlong Chen*, Zhenyu Zhang*, Sijia Liu, Shiyu Chan…☆49Dec 30, 2021Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆504Aug 30, 2021Updated 4 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆758May 3, 2022Updated 3 years ago
- Code for paper "Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality".☆125Nov 4, 2020Updated 5 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- Code for the paper Adversarial Robustness via Adversarial Label-Smoothing☆11Feb 5, 2020Updated 6 years ago
- Library containing PyTorch implementations of various adversarial attacks and resources☆166Nov 20, 2025Updated 2 months ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Aug 4, 2021Updated 4 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆64Jan 14, 2020Updated 6 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆524Oct 15, 2023Updated 2 years ago
- Pytorch implementation of our paper accepted by TPAMI 2023 — Lottery Jackpots Exist in Pre-trained Models☆35Jun 19, 2023Updated 2 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆170Jul 2, 2020Updated 5 years ago
- An example code of implement of PGD and FGSM algorithm for adversarial attack☆12Mar 3, 2022Updated 3 years ago
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago