lxuniverse / gdpaLinks
☆13Updated 3 years ago
Alternatives and similar repositories for gdpa
Users that are interested in gdpa are comparing it to the libraries listed below
Sorting:
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆58Updated 4 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆48Updated 3 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Updated 2 years ago
- ☆41Updated last year
- ☆41Updated 3 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆43Updated last year
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆41Updated 4 years ago
- Data-Efficient Backdoor Attacks☆18Updated 3 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Updated 4 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18Updated 2 years ago
- ☆40Updated last year
- ☆15Updated 2 years ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆59Updated 3 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Updated 3 years ago
- ☆58Updated 3 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Updated 3 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Updated 3 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆25Updated 5 years ago
- ☆11Updated 3 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Updated 2 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Updated last year
- Code for identifying natural backdoors in existing image datasets.☆15Updated 2 years ago
- ☆85Updated 4 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 5 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Updated 4 years ago
- SEAT☆21Updated last year
- ☆19Updated 3 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆28Updated 8 months ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆17Updated 3 years ago