mastnk / imageshuffle
☆15Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for imageshuffle
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆55Updated last year
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆13Updated 2 years ago
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆59Updated 5 years ago
- ☆26Updated 2 years ago
- Generating Adversarial Images for Image-to-Image models in Pytorch☆15Updated 4 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 5 years ago
- ☆17Updated last year
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆32Updated 3 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆31Updated last year
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆15Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆30Updated 3 years ago
- ☆18Updated last year
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆40Updated 4 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆14Updated 2 years ago
- A Universal Adversarial Dataset☆32Updated 4 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆97Updated 3 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆42Updated last year
- Pytorch reimplementation of "One pixel attack for fooling deep neural networks"☆85Updated 6 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 4 years ago
- Attacks against proposed image encryption schemes☆10Updated 4 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆24Updated 2 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated last year
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆59Updated last year
- ☆39Updated 2 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆25Updated 2 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆36Updated 4 years ago
- ☆24Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Updated 5 years ago
- ☆12Updated 5 years ago
- Universal Adversarial Networks☆33Updated 6 years ago