Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with Objectives." In ACM TOPS, 2019.
☆36Sep 19, 2020Updated 5 years ago
Alternatives and similar repositories for agns
Users that are interested in agns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆337Feb 18, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- Original PyTorch implementation of the AdversarialMask paper☆22Apr 16, 2023Updated 2 years ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- CAAD 2018 winning submissions☆34Feb 10, 2019Updated 7 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆26Dec 23, 2020Updated 5 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 6 years ago
- Reproduces BPDA attack in pytorch☆13Oct 10, 2019Updated 6 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Adversarial Attack on Visual Object Tracking☆15May 13, 2021Updated 4 years ago
- ☆21Nov 19, 2021Updated 4 years ago
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆19Jul 5, 2022Updated 3 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆27Jan 6, 2022Updated 4 years ago
- ☆20Sep 13, 2021Updated 4 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆45Aug 12, 2023Updated 2 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆93Mar 24, 2023Updated 3 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- a Blender script to procedurally generate 3D printable glasses☆46Apr 26, 2018Updated 7 years ago
- Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)☆34Aug 18, 2021Updated 4 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60May 14, 2019Updated 6 years ago
- DAO DAO documentation.☆12Jun 17, 2025Updated 9 months ago
- OpenPose: A Real-Time Multi-Person Keypoint Detection And Multi-Threading C++ Library☆12Jul 13, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆10Aug 14, 2023Updated 2 years ago
- A more experimental runtime for Ink, focused on perf and instrumentation☆16Dec 25, 2020Updated 5 years ago
- Pytorch plugin to generate saliency maps for neural networks☆12Nov 1, 2018Updated 7 years ago
- ☆10May 14, 2023Updated 2 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Jan 25, 2022Updated 4 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆85Feb 18, 2021Updated 5 years ago