A curated list of papers on adversarial machine learning (adversarial examples and defense methods).
☆211May 27, 2022Updated 3 years ago
Alternatives and similar repositories for attack-and-defense-methods
Users that are interested in attack-and-defense-methods are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- PyTorch implementation of adversarial attacks [torchattacks]☆2,155Jun 29, 2024Updated last year
- Paper sharing in adversary related works☆46Aug 14, 2025Updated 8 months ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆743May 16, 2024Updated last year
- RobustBench: a standardized adversarial robustness benchmark [NeurIPS 2021 Benchmarks and Datasets Track]☆772Mar 31, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Related papers for robust machine learning☆562May 25, 2023Updated 2 years ago
- Paper list of Adversarial Examples☆51Oct 12, 2023Updated 2 years ago
- A library for experimenting with, training and evaluating neural networks, with a focus on adversarial robustness.☆942Jan 11, 2024Updated 2 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- Library containing PyTorch implementations of various adversarial attacks and resources☆166Nov 20, 2025Updated 4 months ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆510Aug 30, 2021Updated 4 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆170Jul 2, 2020Updated 5 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆551Mar 30, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Dec 29, 2021Updated 4 years ago
- This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.☆227Oct 7, 2019Updated 6 years ago
- A Toolbox for Adversarial Robustness Research☆1,366Sep 14, 2023Updated 2 years ago
- ☆35Dec 9, 2020Updated 5 years ago
- PyTorch-1.0 implementation for the adversarial training on MNIST/CIFAR-10 and visualization on robustness classifier.☆254Aug 26, 2020Updated 5 years ago
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆444Jul 25, 2024Updated last year
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆118Mar 30, 2022Updated 4 years ago
- ☆63Apr 2, 2021Updated 5 years ago
- ☆161Feb 26, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A pytorch adversarial library for attack and defense methods on images and graphs☆1,081Jun 26, 2025Updated 9 months ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Jan 25, 2022Updated 4 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,957Dec 3, 2025Updated 4 months ago
- Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and…☆5,925Dec 12, 2025Updated 4 months ago
- Feature Scattering Adversarial Training (NeurIPS19)☆73Jun 1, 2024Updated last year
- A list of backdoor learning resources☆1,163Jul 31, 2024Updated last year
- ☆13Sep 26, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Empirical tricks for training robust models (ICLR 2021)☆256May 25, 2023Updated 2 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆45Mar 24, 2023Updated 3 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆101Apr 30, 2021Updated 4 years ago
- A Paperlist of Adversarial Attack on Object Detection☆124Mar 16, 2023Updated 3 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago