🛡 A curated list of adversarial attacks in PyTorch, with a focus on transferable black-box attacks.
☆71Dec 22, 2025Updated 4 months ago
Alternatives and similar repositories for torchattack
Users that are interested in torchattack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A peer-to-peer communication system. BIT 小学期软件开发实训。☆11Sep 7, 2018Updated 7 years ago
- Mihomo CLI client on Linux. Formerly `clashrup`.☆175Apr 25, 2026Updated last week
- 😎 up-to-date & curated list of awesome Attacks on Large-Vision-Language-Models papers, methods & resources.☆541Apr 17, 2026Updated 2 weeks ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- The website of Net Pioneer Association of BIT.☆14Apr 7, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆14Jan 19, 2024Updated 2 years ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆20Aug 22, 2024Updated last year
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆28Aug 17, 2023Updated 2 years ago
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- A Sokoban Game implemented with WPF, and Assembly in its core.☆11Jun 6, 2019Updated 6 years ago
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆67Mar 22, 2025Updated last year
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆41Feb 29, 2024Updated 2 years ago
- ☆93Apr 1, 2026Updated last month
- ICLR 2019 Paper, "Characterizing Audio Adversarial Examples using Temporal Dependency".☆12Apr 3, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆42Aug 13, 2023Updated 2 years ago
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- EncryptedClipboard☆13Sep 24, 2020Updated 5 years ago
- Data-Independent Operator: A Training-Free Artifact Representation Extractor for Generalizable Deepfake Detection☆18Mar 19, 2024Updated 2 years ago
- Web VPN converter.☆88Jan 30, 2026Updated 3 months ago
- Data and code for EACL'24 paper: Over-Reasoning and Redundant Calculation of Large Language Models☆11Jan 23, 2024Updated 2 years ago
- A custom Jike name badge.☆22Aug 22, 2019Updated 6 years ago
- Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021☆20Dec 6, 2021Updated 4 years ago
- This repo is the artifact of FUEL☆15Apr 24, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Official implementation of the paper DiffDefence: defending against adversarial attacks via diffusion models. ICIAP 2023.☆20Feb 1, 2024Updated 2 years ago
- Code for our NeurIPS 2024 paper Improved Generation of Adversarial Examples Against Safety-aligned LLMs☆12Nov 7, 2024Updated last year
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆117Jul 21, 2022Updated 3 years ago
- A web app that can improve your study experience in University of Manchester☆19Apr 15, 2023Updated 3 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆45Nov 20, 2024Updated last year
- ☆44May 8, 2020Updated 5 years ago
- [NIPS 2021] Code release for "Pareto Domain Adaptation"☆11Dec 13, 2021Updated 4 years ago
- Code for our NeurIPS 2023 paper Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly☆14Jan 22, 2024Updated 2 years ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆68Mar 20, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- docker compose outline☆11Apr 22, 2023Updated 3 years ago
- 机器学习 数据挖掘 案例和竞赛 代码☆11Apr 2, 2021Updated 5 years ago
- Built a system from scratch in Python which can detect spelling and grammatical errors in a word and sentence respectively using N-gram b…☆15Jul 4, 2021Updated 4 years ago
- Unofficial PyTorch implementation of the paper "Feature Importance-aware Transferable Adversarial Attacks"☆11Oct 28, 2025Updated 6 months ago
- [AAAI 2024] XKD: Cross-modal Knowledge Distillation with Domain Alignment for Video Representation Learning.☆16Jul 9, 2024Updated last year
- (Archived) Weibo Emoji is a repository for saving and sharing most Emoji images that are used/were previously used by the app Weibo.☆35Oct 4, 2023Updated 2 years ago
- An image API for simpledesktops.com☆34Apr 20, 2019Updated 7 years ago