wangjksjtu / awesome-AMLView external linksLinks
A curated list of awesome adversarial attack and defense papers
☆45Sep 21, 2020Updated 5 years ago
Alternatives and similar repositories for awesome-AML
Users that are interested in awesome-AML are comparing it to the libraries listed below
Sorting:
- This repository is a curated list of papers and open source code about competition for CV Adversarial Attack.☆27Jan 9, 2023Updated 3 years ago
- For Competition on Adversarial Attacks and Defenses 2018☆40Jan 4, 2019Updated 7 years ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆38Apr 23, 2025Updated 9 months ago
- Adversarially Robust Transfer Learning with LWF loss applied to the deep feature representation (penultimate) layer☆19Feb 9, 2020Updated 6 years ago
- [ICML 2023] "NeRFool: Uncovering the Vulnerability of Generalizable Neural Radiance Fields against Adversarial Perturbations" by Yonggan …☆18Mar 10, 2024Updated last year
- PyTorch adversarial attack baselines for ImageNet, CIFAR10, and MNIST (state-of-the-art attacks comparison)☆20Mar 12, 2021Updated 4 years ago
- A Paperlist of Adversarial Attack on Object Detection☆125Mar 16, 2023Updated 2 years ago
- ☆57Mar 24, 2023Updated 2 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- ☆30Feb 17, 2022Updated 3 years ago
- source code for paper "Riemannian Preconditioned LoRA for Fine-Tuning Foundation Models"☆34Jun 20, 2024Updated last year
- A pytorch implementation of "Intriguing properties of neural networks"☆25Sep 4, 2019Updated 6 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- BabyAI++: Towards Grounded language Learning beyond Memorization, ICLR BeTR-RL 2020☆26Jul 28, 2020Updated 5 years ago
- Geometric Adversarial Attacks and Defenses on 3D Point Clouds (3DV 2021)☆27Jun 25, 2023Updated 2 years ago
- Guide to build FFmpeg from source with Netflix's libvmaf on Ubuntu 18.04☆11Oct 12, 2020Updated 5 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated last year
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Jun 15, 2022Updated 3 years ago
- SelectiveBackprop accelerates training by dynamically prioritizing useful examples with high loss☆32Mar 12, 2020Updated 5 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆39Feb 29, 2024Updated last year
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Dec 26, 2019Updated 6 years ago
- Research on adversarial attacks and defenses for deep neural network 3D point cloud classifiers like PointNet and PointNet++.☆27May 22, 2020Updated 5 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆35Mar 8, 2021Updated 4 years ago
- Robust PCA: PCP, Stable PCP, PCP with compressed data, IRCUR☆12Dec 19, 2021Updated 4 years ago
- StrAttack, ICLR 2019☆33Aug 4, 2019Updated 6 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Oct 21, 2020Updated 5 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆87Jun 9, 2022Updated 3 years ago
- ☆11Jun 1, 2017Updated 8 years ago
- ☆12Feb 23, 2022Updated 3 years ago
- ☆10Aug 3, 2024Updated last year
- Implementation for paper2repo☆11Dec 7, 2020Updated 5 years ago
- ☆10Oct 11, 2022Updated 3 years ago
- LEAP is a novel tool for discovering latent temporal causal relations.☆17Oct 18, 2021Updated 4 years ago
- ☆13Apr 14, 2025Updated 10 months ago
- The official implementation of paper "TRCE: Towards Reliable Malicious Concept Erasure in Text-to-Image Diffusion Models"☆15Mar 11, 2025Updated 11 months ago
- Contains implementation of the DoubIL and ResiduIL algorithms from the ICML '22 paper Causal Imitation Learning under Temporally Correlat…☆11Dec 9, 2022Updated 3 years ago
- [CVPR 2025] Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head Generation☆19Dec 18, 2025Updated last month
- Targeted black-box adversarial attack using Bayesian Optimization☆38Jun 14, 2020Updated 5 years ago