Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)
☆19Oct 11, 2022Updated 3 years ago
Alternatives and similar repositories for ADA
Users that are interested in ADA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Dec 12, 2022Updated 3 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- ☆37Jul 3, 2024Updated last year
- ☆12Sep 14, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆40Aug 28, 2022Updated 3 years ago
- [NeurIPS 2022] GAMA: Generative Adversarial Multi-Object Scene Attacks☆19Sep 5, 2023Updated 2 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Mar 28, 2026Updated last week
- ☆12Sep 22, 2023Updated 2 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆142Sep 11, 2025Updated 7 months ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆45Mar 24, 2023Updated 3 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 8 months ago
- [ICCV 2023] Code for "Distracting Downpour: Adversarial Weather Attacks for Motion Estimation"☆19Aug 17, 2023Updated 2 years ago
- Official code implement of "Your Diffusion Model is Secretly a Certifiably Robust Classifier"☆18Feb 2, 2024Updated 2 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- ☆17Nov 15, 2021Updated 4 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆466Feb 27, 2026Updated last month
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆23Feb 10, 2025Updated last year
- This repository contains code for our paper titled "A semi-supervised teacher-student framework for surgical tool detection and localizat…☆10Nov 16, 2023Updated 2 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 4 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- The official implementation of VidFace☆12Aug 27, 2024Updated last year
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆26Aug 31, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- [ICML 2023] "NeRFool: Uncovering the Vulnerability of Generalizable Neural Radiance Fields against Adversarial Perturbations" by Yonggan …☆18Mar 10, 2024Updated 2 years ago
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Dec 29, 2021Updated 4 years ago
- [ICCV-2025] Universal Adversarial Attack, Multimodal Adversarial Attacks, VLP models, Contrastive Learning, Cross-modal Perturbation Gene…☆37Jul 10, 2025Updated 9 months ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 6 years ago
- A curated list of papers for the transferability of adversarial examples☆77Jul 8, 2024Updated last year
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆64Jul 7, 2021Updated 4 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago