qilong-zhang / Staircase-sign-method
Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.
☆17Updated 2 years ago
Alternatives and similar repositories for Staircase-sign-method:
Users that are interested in Staircase-sign-method are comparing it to the libraries listed below
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆26Updated 2 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Updated 3 years ago
- ☆26Updated 2 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Updated 2 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆79Updated 2 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆48Updated 2 years ago
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆53Updated 2 years ago
- ☆69Updated 3 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆89Updated 2 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Updated 2 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆84Updated 11 months ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆11Updated last year
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Updated 4 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆28Updated 11 months ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆33Updated 4 years ago
- ☆21Updated 2 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated last year
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆19Updated last year
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆25Updated last year
- ☆34Updated 11 months ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆15Updated 2 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆19Updated 4 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆59Updated 3 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆14Updated 3 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆60Updated 2 years ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Updated last year
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆22Updated 2 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆29Updated 2 years ago
- ☆33Updated 2 years ago