satyanshukla / bayes_attackView external linksLinks
Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"
☆15Dec 20, 2020Updated 5 years ago
Alternatives and similar repositories for bayes_attack
Users that are interested in bayes_attack are comparing it to the libraries listed below
Sorting:
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated 11 months ago
- Official PyTorch implementation of "Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian O…☆25Sep 26, 2023Updated 2 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Feb 10, 2023Updated 3 years ago
- ☆12Mar 15, 2019Updated 6 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- ☆64Jan 6, 2022Updated 4 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆59Jan 31, 2020Updated 6 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆35Mar 8, 2021Updated 4 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆58Jun 3, 2020Updated 5 years ago
- ☆14Jun 5, 2020Updated 5 years ago
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆73Nov 19, 2022Updated 3 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆17Jul 19, 2022Updated 3 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- Pytorch code for ens_adv_train☆17Jun 7, 2019Updated 6 years ago
- ☆128Sep 25, 2025Updated 4 months ago
- ☆47Feb 21, 2020Updated 5 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆20Aug 22, 2024Updated last year
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆170Jul 2, 2020Updated 5 years ago
- TIFS2022: Decision-based Adversarial Attack with Frequency Mixup☆22Aug 8, 2023Updated 2 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated last year
- It turns out that adversarial and clean data are not twins, not at all.☆18Apr 19, 2017Updated 8 years ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆26Feb 13, 2023Updated 3 years ago
- Implementation of Wasserstein adversarial attacks.☆24Jan 2, 2021Updated 5 years ago
- [NeurIPS2021] Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks☆34Jul 5, 2024Updated last year
- Code for the ICCV 2021 paper "Augmented Lagrangian Adversarial Attacks"☆24Mar 28, 2024Updated last year
- Code for Adversarial Example Games NeurIPS 2020 Paper☆27Nov 27, 2024Updated last year
- ☆25Mar 24, 2023Updated 2 years ago
- RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)☆57Nov 5, 2020Updated 5 years ago
- Code used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)☆61Feb 25, 2018Updated 7 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆22Aug 18, 2019Updated 6 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 3 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆69Mar 19, 2018Updated 7 years ago