Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021
☆20Dec 6, 2021Updated 4 years ago
Alternatives and similar repositories for minmax-adv
Users that are interested in minmax-adv are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Mar 28, 2026Updated last month
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Nov 17, 2022Updated 3 years ago
- ☆15Dec 18, 2024Updated last year
- [ICLR'22] Self-supervised learning optimally robust representations for domain shift.☆25Feb 2, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆22Dec 12, 2022Updated 3 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆16Dec 8, 2022Updated 3 years ago
- EasyRobust: an Easy-to-use library for state-of-the-art Robust Computer Vision Research with PyTorch.☆339Jun 30, 2024Updated last year
- Original PyTorch implementation of the AdversarialMask paper☆23Apr 16, 2023Updated 3 years ago
- Code for the paper "A Light Recipe to Train Robust Vision Transformers" [SaTML 2023]☆54Feb 6, 2023Updated 3 years ago
- ☆17Nov 15, 2021Updated 4 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Aug 28, 2021Updated 4 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- [TDSC 2025] Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors☆16Aug 12, 2025Updated 8 months ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Official codes for GRA (Accepted by ICCV2023)☆17Jul 18, 2023Updated 2 years ago
- ☆17Sep 23, 2022Updated 3 years ago
- ☆18Nov 9, 2021Updated 4 years ago
- A Backdoor Attack against 3D Point Cloud Classifiers (ICCV2021)☆18Oct 20, 2021Updated 4 years ago
- https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/☆20May 9, 2022Updated 3 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- CAAD 2018 winning submissions☆34Feb 10, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [ICLR 2022] "Sparsity Winning Twice: Better Robust Generalization from More Efficient Training" by Tianlong Chen*, Zhenyu Zhang*, Pengjun…☆40Mar 20, 2022Updated 4 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆63May 8, 2023Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- Automated neural architecture search algorithms implemented in PyTorch and Autogluon toolkit.☆12Apr 17, 2020Updated 6 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Apr 22, 2022Updated 4 years ago
- Developing adversarial examples and showing their semantic generalization for the OpenAI CLIP model (https://github.com/openai/CLIP)☆26Mar 6, 2021Updated 5 years ago
- ☆43May 21, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆20Aug 30, 2022Updated 3 years ago
- ☆37Jul 3, 2024Updated last year
- ☆16Jan 4, 2022Updated 4 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆64Sep 16, 2025Updated 7 months ago
- This repo includes our code for evaluating and improving transferability in domain generalization (NeurIPS 2021)☆13Nov 1, 2022Updated 3 years ago
- Code accompanying the NeurIPS 2019 paper AutoAssist: A Framework to Accelerate Training of Deep Neural Networks.☆14Oct 3, 2022Updated 3 years ago
- [ICLR 2025 Spotlight] Weak-to-strong preference optimization: stealing reward from weak aligned model☆18Feb 24, 2025Updated last year