The official implementation of NeurIPS 2021 paper: Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks
☆17Jul 4, 2023Updated 2 years ago
Alternatives and similar repositories for TangentAttack
Users that are interested in TangentAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- ☆10May 18, 2024Updated 2 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- ☆16Feb 1, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)☆56Nov 5, 2020Updated 5 years ago
- Keras Implementation of "Towards K-means-friendly Spaces: Simultaneous Deep Learning and Clustering"☆11Feb 4, 2020Updated 6 years ago
- TIFS2022: Decision-based Adversarial Attack with Frequency Mixup☆22Aug 8, 2023Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- ☆14Dec 9, 2022Updated 3 years ago
- ☆13Feb 24, 2020Updated 6 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Dec 12, 2020Updated 5 years ago
- ☆11Apr 6, 2024Updated 2 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆23Dec 27, 2020Updated 5 years ago
- A P2P chat application client suitable for local area network(LAN)(Windows) developed using Qt5 and C++.☆14Jan 14, 2022Updated 4 years ago
- ☆18Feb 7, 2020Updated 6 years ago
- Invariant-feature Subspace Recovery (ISR)☆23Sep 23, 2022Updated 3 years ago
- ☆27Oct 16, 2022Updated 3 years ago
- 2024届求职-C++后端-学习笔记-操作系统、计算机网络、C++语言+算法☆13Oct 31, 2023Updated 2 years ago
- MATLAB implementation of linear support vector classification in hyperbolic space☆21Jun 5, 2018Updated 7 years ago
- IVA-Xception model which can achieve high performance in identifying multiple birds from overlapping bird sounds recordings based on IVA …☆16Oct 20, 2021Updated 4 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 计算机毕业设计吊打导师hadoop+spark知识图谱股票基金推荐系统 股票基金预测系统 股票基金可视化系统 股票基金数据分析 股票基金大数据 股票基金爬虫 大数据毕设 大数据毕业设计 机器学习 深度学习 人工智能☆12Jul 8, 2023Updated 2 years ago
- Adversarial Detection v.s. Object Detection.☆14Jul 29, 2023Updated 2 years ago
- Official implemention of the paper High-Resolution and Precise Counterfactual Medical Image Generation using Language-guided Stable Diffu…☆23Jul 8, 2025Updated 10 months ago
- Code for the ICML 2019 paper: Distribution Calibration for Regression☆22Aug 8, 2023Updated 2 years ago
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆174Jul 5, 2024Updated last year
- ☆14Nov 7, 2022Updated 3 years ago
- ☆38Nov 24, 2021Updated 4 years ago
- This repository contains the code for our ECCV 2022 paper on our "Non-isotropic Probabilistic Take on Proxy-based Deep Metric Learning".☆12Dec 6, 2022Updated 3 years ago
- ☆10May 8, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- GTNet:Guided Transformer Network for Detecting Human-Object Interactions☆15Apr 4, 2023Updated 3 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆40Aug 30, 2020Updated 5 years ago
- ☆13Apr 2, 2025Updated last year
- Type-Specific Adversarial Attack for Object Detection☆13Aug 27, 2021Updated 4 years ago
- Using AutoDIAL framework for training US-CT end to end network working on real US images☆10Nov 30, 2017Updated 8 years ago
- Code for our paper "Regularizing Neural Networks via Adversarial Model Perturbation", CVPR2021☆41May 25, 2021Updated 4 years ago
- ☆13Jul 20, 2023Updated 2 years ago