thestephencasper / feature_level_adv
Demo code for the paper: One Thing to Fool them All: Generating Interpretable, Universal, and Physically-Realizable Adversarial Features
☆10Updated 9 months ago
Related projects: ⓘ
- Universal Adversarial Perturbations (UAPs) for PyTorch☆45Updated 3 years ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆58Updated 2 years ago
- ☆59Updated 7 months ago
- ☆37Updated 7 months ago
- Adversarial Augmentation Against Adversarial Attacks☆27Updated last year
- ☆27Updated 2 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆40Updated 3 years ago
- ☆38Updated 9 months ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆28Updated 2 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆57Updated 3 years ago
- SEAT☆19Updated 11 months ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Updated 4 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆24Updated 2 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆95Updated 3 years ago
- Code for the paper titled "Adversarial Vulnerability of Randomized Ensembles" (ICML 2022).☆10Updated 2 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆35Updated 2 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆36Updated 3 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆28Updated last year
- Certified robustness "for free" using off-the-shelf diffusion models and classifiers☆34Updated last year
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆69Updated last year
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆77Updated last week
- ☆28Updated 2 years ago
- Code corresponding to the paper: "On the Robustness of Vision Transformers": https://arxiv.org/abs/2104.02610☆23Updated 5 months ago
- ☆28Updated 3 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆26Updated 2 years ago
- ☆12Updated 2 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆43Updated 11 months ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆24Updated 3 years ago
- ☆31Updated 9 months ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆14Updated 2 years ago