messi84 / Multiple-Adversarial_Examples_attack
六代兴亡如梦,苒苒惊时月。纵使岁寒途远,此志应难夺。
☆11Updated 5 years ago
Alternatives and similar repositories for Multiple-Adversarial_Examples_attack:
Users that are interested in Multiple-Adversarial_Examples_attack are comparing it to the libraries listed below
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆86Updated last year
- ☆70Updated 3 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Updated 2 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆42Updated 2 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Updated 5 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆82Updated 2 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 4 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆91Updated 2 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆90Updated 3 years ago
- ☆35Updated last year
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆56Updated last year
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Updated 2 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆92Updated 5 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆102Updated 2 years ago
- ☆35Updated 10 months ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆35Updated last year
- an efficient method for detecting adversarial image examples☆19Updated 6 years ago
- ☆14Updated 4 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Updated 3 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆27Updated 3 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆24Updated 3 years ago
- An adversarial attack on object detectors☆149Updated 3 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆85Updated 2 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆42Updated 6 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆25Updated last year
- ☆31Updated 3 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆75Updated 3 years ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆18Updated last year
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆15Updated 4 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆126Updated 4 years ago