☆79Oct 20, 2019Updated 6 years ago
Alternatives and similar repositories for Adversarial-Attack-Algorithms
Users that are interested in Adversarial-Attack-Algorithms are comparing it to the libraries listed below
Sorting:
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆31Apr 27, 2022Updated 3 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆36Mar 14, 2021Updated 4 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆134May 29, 2018Updated 7 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- Robust evasion attacks against neural network to find adversarial examples☆859Jun 1, 2021Updated 4 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆44Mar 24, 2023Updated 2 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆137Nov 25, 2020Updated 5 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- ☆12Mar 15, 2019Updated 6 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Jun 9, 2017Updated 8 years ago
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆86Aug 10, 2017Updated 8 years ago
- A curated list of awesome resources for adversarial examples in deep learning☆265Feb 4, 2021Updated 5 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆758May 3, 2022Updated 3 years ago
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- Public repo for transferability ICLR 2017 paper☆53Jan 3, 2019Updated 7 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 6 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- [Machine Learning 2023] Imbalanced Gradients: A Subtle Cause of Overestimated Adversarial Robustness☆17Jul 5, 2024Updated last year
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆62Feb 1, 2023Updated 3 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆416Jul 6, 2021Updated 4 years ago
- Code for the NeurIPS 2019 submission: "Improving Black-box Adversarial Attacks with a Transfer-based Prior".☆16May 6, 2020Updated 5 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆17Jul 19, 2022Updated 3 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆276Dec 31, 2020Updated 5 years ago
- Code for Geometry-Aware Generation of Adversarial Point Clouds☆35Jul 15, 2021Updated 4 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- Repo of simple adversarial examples on vanilla neural networks trained on MNIST☆121May 8, 2020Updated 5 years ago
- Spatially Transformed Adversarial Examples with TensorFlow☆75Nov 3, 2018Updated 7 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆179Oct 4, 2021Updated 4 years ago
- The code for ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples (CVPR2019)☆115Jul 7, 2022Updated 3 years ago
- This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.☆228Oct 7, 2019Updated 6 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 7 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆43Feb 7, 2019Updated 7 years ago
- Countering Adversarial Image using Input Transformations.☆497Sep 29, 2021Updated 4 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆227May 21, 2019Updated 6 years ago