The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]
☆15May 11, 2020Updated 5 years ago
Alternatives and similar repositories for PPBA
Users that are interested in PPBA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆49Oct 3, 2023Updated 2 years ago
- A Python package of cooperative co-evolutionary algorithms for feature selection in high-dimensional data.☆15Apr 12, 2026Updated 2 weeks ago
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆19Jul 20, 2021Updated 4 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆15Mar 20, 2020Updated 6 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inferen…☆15Nov 21, 2022Updated 3 years ago
- UAV PATH TRACKING AND DYNAMIC AVOIDANCE BASED ON ADS-B AND DEEP REINFORCEMENT LEARNING for Univerisity of Bristol RP3 final☆12Apr 18, 2023Updated 3 years ago
- Implementation of "Quadrotor Helicopter Trajectory Tracking Control"☆14Jan 11, 2021Updated 5 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Oct 21, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Jun 7, 2021Updated 4 years ago
- CVPR2022 Distillation Using Oracle Queries for Transformer-based Human-Object Interaction Detection☆24Sep 17, 2022Updated 3 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- Pytorch implementation of our paper accepted by ICML 2023 -- "Bi-directional Masks for Efficient N:M Sparse Training"☆13Jun 7, 2023Updated 2 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆79Jan 13, 2022Updated 4 years ago
- Fork of cma-es library by Nikolaus Hansen☆12Jul 12, 2017Updated 8 years ago
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- Code for the Joint Part-of-Speech Embedding model☆13Feb 16, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code release of "Deep Visual-Semantic Quantization of Efficient Image Retrieval" (CVPR 17)☆11Apr 5, 2017Updated 9 years ago
- Example of a RAG application using Spring AI, OpenAI and Elasticsearch as a Vector Store☆18Mar 3, 2025Updated last year
- MMAct Challenge☆13Jun 20, 2021Updated 4 years ago
- A collection of tools for tracking planes/helicopters/UFOs/whatever with ADS-B. Packaged for NixOS with packages and modules☆22Jun 11, 2025Updated 10 months ago
- ☆23Sep 1, 2020Updated 5 years ago
- The bare necessities of Pandas on the Weld runtime☆14Dec 26, 2022Updated 3 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆32Jun 9, 2020Updated 5 years ago
- Tensorflow implementation of DeepLabv2☆22Aug 17, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- OpenAI GYM environment for 6-DOF Helicopter simulation☆17Apr 27, 2024Updated 2 years ago
- ☆10May 24, 2022Updated 3 years ago
- Targeted black-box adversarial attack using Bayesian Optimization☆38Jun 14, 2020Updated 5 years ago
- I have created a dataset of Image-Text-Pairs by using the cosine similarity of the CLIP embeddings of the image & it's caption derrived f…☆16Apr 22, 2021Updated 5 years ago
- Pytorch implementation of Adversarially Robust Distillation (ARD)☆59May 24, 2019Updated 6 years ago
- Matlab codes of GTH☆11Apr 18, 2019Updated 7 years ago