☆14Mar 23, 2023Updated 3 years ago
Alternatives and similar repositories for PAR
Users that are interested in PAR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆36Mar 16, 2022Updated 4 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 9 months ago
- The code for the Ensemble everything everywhere: Multi-scale aggregation for adversarial robustness paper☆22Nov 8, 2024Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆29Jul 18, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆59Jun 18, 2021Updated 4 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆67Mar 20, 2023Updated 3 years ago
- ☆37Jul 3, 2024Updated last year
- ☆23Sep 5, 2025Updated 8 months ago
- Privacy backdoors☆50Apr 28, 2024Updated 2 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆73Nov 19, 2022Updated 3 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆71Sep 6, 2023Updated 2 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- PyTorch Implementation of the Deep k-Nearest-Neighbors algorithm, https://arxiv.org/abs/1803.04765☆16Aug 18, 2020Updated 5 years ago
- Code for "Preference Tuning For Toxicity Mitigation Generalizes Across Languages." Paper accepted at Findings of EMNLP 2024☆18Mar 25, 2025Updated last year
- ☆14Apr 18, 2022Updated 4 years ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆26Feb 13, 2023Updated 3 years ago
- Official Implementation of wd1☆29Sep 25, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Dataset for the paper "RGBD1K: A Large-scale Dataset and Benchmark for RGB-D Object Tracking".☆21Dec 10, 2025Updated 4 months ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆16Apr 24, 2022Updated 4 years ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆71Aug 7, 2025Updated 8 months ago
- Pytorch implementation of gradCAM, guidedBackProp, smoothGrad☆13Mar 5, 2019Updated 7 years ago
- ☆11Dec 18, 2024Updated last year
- Out-of-distribution generalization benchmarks for image recognition models☆14Apr 5, 2020Updated 6 years ago
- ☆12Sep 14, 2021Updated 4 years ago
- ☆64Aug 9, 2023Updated 2 years ago
- ☆13Jul 11, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- Code and experiments for the adversarial detection paper☆21Jun 11, 2021Updated 4 years ago
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆17Sep 1, 2023Updated 2 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆338Jan 29, 2023Updated 3 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago