spencerwooo / torchattack
π‘ A set of adversarial attacks in PyTorch
β37Updated this week
Related projects β
Alternatives and complementary repositories for torchattack
- β11Updated 10 months ago
- β76Updated 3 years ago
- [NeurIPS-2023] Annual Conference on Neural Information Processing Systemsβ163Updated last year
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.β69Updated last year
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.β76Updated last year
- β98Updated 7 months ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllabilityβ88Updated last year
- β86Updated 9 months ago
- A list of recent papers about adversarial learningβ74Updated this week
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.β178Updated 8 months ago
- β56Updated 4 months ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examplesβ90Updated 2 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023β82Updated 2 months ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779β69Updated 7 months ago
- Revisiting Transferable Adversarial Images (arXiv)β114Updated last month
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.β280Updated last month
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Modelsβ50Updated last year
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2β¦β40Updated 3 weeks ago
- SaTML 2023, 1st place in CVPRβ21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.β24Updated last year
- β17Updated 2 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.β151Updated last month
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Imagesβ24Updated 10 months ago
- Official codebase for Image Hijacks: Adversarial Images can Control Generative Models at Runtimeβ38Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protectiβ¦β52Updated 8 months ago
- Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Modelsβ183Updated 6 months ago
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)β125Updated last year
- A curated list of papers for the transferability of adversarial examplesβ55Updated 4 months ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]β47Updated last year
- β28Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20β¦β25Updated last year