☆14Mar 23, 2023Updated 3 years ago
Alternatives and similar repositories for PAR
Users that are interested in PAR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆35Mar 16, 2022Updated 4 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 8 months ago
- The code for the Ensemble everything everywhere: Multi-scale aggregation for adversarial robustness paper☆22Nov 8, 2024Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆28Jul 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- Code for our ICLR Trustworthy ML 2020 workshop paper "Improved Image Wasserstein Attacks and Defenses"☆14Apr 28, 2020Updated 5 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- MIT 6.172 Performance Engineering of Software Systems☆16Dec 30, 2021Updated 4 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆59Jun 18, 2021Updated 4 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆67Mar 20, 2023Updated 3 years ago
- ☆37Jul 3, 2024Updated last year
- ☆22Sep 5, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Privacy backdoors☆50Apr 28, 2024Updated last year
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- ☆23Sep 1, 2020Updated 5 years ago
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆72Nov 19, 2022Updated 3 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- Code from CCS paper: The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning☆14Feb 27, 2023Updated 3 years ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆72Sep 6, 2023Updated 2 years ago
- PyTorch Implementation of the Deep k-Nearest-Neighbors algorithm, https://arxiv.org/abs/1803.04765☆16Aug 18, 2020Updated 5 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆14Apr 18, 2022Updated 3 years ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆26Feb 13, 2023Updated 3 years ago
- Official Implementation of wd1☆26Sep 25, 2025Updated 6 months ago
- Second-Order Pooling for Graph Neural Networks☆16Jun 4, 2020Updated 5 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- 中国海洋大学(OUC) 计算机网络 实验 可靠传输协议 RDT☆23Apr 15, 2020Updated 6 years ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆70Aug 7, 2025Updated 8 months ago
- ☆11Dec 18, 2024Updated last year
- ☆63Aug 9, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Jul 11, 2019Updated 6 years ago
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆17Sep 1, 2023Updated 2 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- Dual Adaptive Representation Alignment for Cross-domain Few-shot Learning TPAMI 2023☆25May 30, 2024Updated last year
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆338Jan 29, 2023Updated 3 years ago