val-iisc / GAMA-GATView external linksLinks
Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020
☆27Dec 23, 2020Updated 5 years ago
Alternatives and similar repositories for GAMA-GAT
Users that are interested in GAMA-GAT are comparing it to the libraries listed below
Sorting:
- Official Code for Efficient and Effective Augmentation Strategy for Adversarial Training (NeurIPS-2022)☆17Mar 29, 2023Updated 2 years ago
- [ICLR 2022 official code] Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness?☆29Mar 15, 2022Updated 3 years ago
- Unofficial implementation of the DeepMind papers "Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples…☆98Mar 4, 2022Updated 3 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Sep 27, 2018Updated 7 years ago
- white box adversarial attack☆38Jan 30, 2021Updated 5 years ago
- Semisupervised learning for adversarial robustness https://arxiv.org/pdf/1905.13736.pdf☆141Mar 30, 2020Updated 5 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆152Oct 15, 2020Updated 5 years ago
- ☆35Dec 9, 2020Updated 5 years ago
- Code for the paper: Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization (https://arxiv.org/abs/2…☆23Nov 23, 2020Updated 5 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆37Aug 17, 2020Updated 5 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆58Jun 3, 2020Updated 5 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 4 years ago
- Adversarial Distributional Training (NeurIPS 2020)☆63Mar 17, 2021Updated 4 years ago
- Attacks Which Do Not Kill Training Make Adversarial Learning Stronger (ICML2020 Paper)☆125Sep 13, 2023Updated 2 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Jun 27, 2022Updated 3 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆22Aug 18, 2019Updated 6 years ago
- Official Code for Scaling Adversarial Training to Large Perturbation Bounds (ECCV-2022)☆11Nov 25, 2022Updated 3 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- ☆162Feb 26, 2021Updated 4 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Apr 22, 2022Updated 3 years ago
- Code for the paper Adversarial Robustness via Adversarial Label-Smoothing☆11Feb 5, 2020Updated 6 years ago
- ☆11Apr 27, 2022Updated 3 years ago
- ☆35Dec 16, 2022Updated 3 years ago
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆146Jul 31, 2023Updated 2 years ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆737May 16, 2024Updated last year
- ☆14Mar 1, 2019Updated 6 years ago
- Towards Defending against Adversarial Examples via Attack-Invariant Features☆12Oct 12, 2023Updated 2 years ago
- ☆14May 24, 2018Updated 7 years ago
- Code for the paper "MMA Training: Direct Input Space Margin Maximization through Adversarial Training"☆34Apr 1, 2020Updated 5 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆61May 14, 2019Updated 6 years ago
- StrAttack, ICLR 2019☆33Aug 4, 2019Updated 6 years ago
- ☆14Jun 5, 2020Updated 5 years ago
- ☆16Dec 4, 2019Updated 6 years ago
- Code for FAB-attack☆34Jul 10, 2020Updated 5 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Feb 15, 2022Updated 3 years ago
- On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them [NeurIPS 2020]☆36Jul 3, 2021Updated 4 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Nov 2, 2020Updated 5 years ago