Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with Objectives." In ACM TOPS, 2019.
☆36Sep 19, 2020Updated 5 years ago
Alternatives and similar repositories for agns
Users that are interested in agns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆338Feb 18, 2021Updated 5 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- some baseline attack method by pytorch☆11Oct 13, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆73Apr 5, 2018Updated 8 years ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- Original PyTorch implementation of the AdversarialMask paper☆23Apr 16, 2023Updated 3 years ago
- CAAD 2018 winning submissions☆34Feb 10, 2019Updated 7 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆26Dec 23, 2020Updated 5 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 6 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆19Jul 5, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆27Jan 6, 2022Updated 4 years ago
- ☆20Sep 13, 2021Updated 4 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆44Aug 12, 2023Updated 2 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 4 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- a Blender script to procedurally generate 3D printable glasses☆46Apr 26, 2018Updated 8 years ago
- Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)☆34Aug 18, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60May 14, 2019Updated 6 years ago
- Pytorch plugin to generate saliency maps for neural networks☆12Nov 1, 2018Updated 7 years ago
- ☆10May 14, 2023Updated 2 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Jan 25, 2022Updated 4 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆85Feb 18, 2021Updated 5 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Detect adversarial images from intermediate features in distance space☆12Aug 22, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- ☆12Jul 19, 2022Updated 3 years ago
- The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0☆28Sep 1, 2023Updated 2 years ago
- [TIP2019]Gated-GAN: Adversarial Gated Networks for Multi-Collection Style Transfer☆29Feb 1, 2024Updated 2 years ago