ndb796 / Pytorch-Adversarial-Training-CIFAR
This repository provides simple PyTorch implementations for adversarial training methods on CIFAR-10.
☆155Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Pytorch-Adversarial-Training-CIFAR
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆144Updated 4 years ago
- Attacks Which Do Not Kill Training Make Adversarial Learning Stronger (ICML2020 Paper)☆124Updated last year
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆85Updated 3 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆211Updated 2 years ago
- PyTorch-1.0 implementation for the adversarial training on MNIST/CIFAR-10 and visualization on robustness classifier.☆242Updated 4 years ago
- A paper list for localized adversarial patch research☆141Updated 10 months ago
- A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"☆146Updated 5 years ago
- A pytorch implementation of "Towards Evaluating the Robustness of Neural Networks"☆53Updated 5 years ago
- Library containing PyTorch implementations of various adversarial attacks and resources☆149Updated last month
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆434Updated 3 months ago
- Unofficial implementation of the DeepMind papers "Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples…☆92Updated 2 years ago
- ☆48Updated 2 years ago
- Implemented CURE algorithm from robustness via curvature regularization and vice versa☆29Updated last year
- ☆153Updated 3 years ago
- Revisiting Transferable Adversarial Images (arXiv)☆113Updated last month
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆77Updated 3 years ago
- A unified benchmark problem for data poisoning attacks☆151Updated last year
- This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks…☆118Updated 2 years ago
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆150Updated 4 months ago
- ☆48Updated 3 years ago
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆123Updated last year
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆94Updated 3 months ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆150Updated 4 years ago
- [NeurIPS 2023] Code for the paper "Revisiting Adversarial Training for ImageNet: Architectures, Training and Generalization across Threa…☆38Updated 10 months ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆32Updated 4 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆55Updated 5 years ago
- Code for the paper "On the Adversarial Robustness of Visual Transformers"☆54Updated 3 years ago
- ☆63Updated 3 years ago
- Reproduces BPDA attack in pytorch☆13Updated 5 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆81Updated 8 months ago