Paper list of Adversarial Examples
☆51Oct 12, 2023Updated 2 years ago
Alternatives and similar repositories for Adversarial-Examples-Paper
Users that are interested in Adversarial-Examples-Paper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Feb 23, 2024Updated 2 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated 2 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆212May 27, 2022Updated 3 years ago
- Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks☆24Dec 11, 2020Updated 5 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆118Jun 3, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆13Feb 28, 2024Updated 2 years ago
- codes for paper "learning to discriminate perturbations for blocking adversarial attacks in text classification" in EMNLP19☆15Feb 25, 2020Updated 6 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆141Sep 11, 2025Updated 6 months ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆24Feb 23, 2024Updated 2 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ACL 2021 - Defense against Adversarial Attacks in NLP via Dirichlet Neighborhood Ensemble☆18Jun 12, 2023Updated 2 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- Code of Data-Free Knowledge Distillation via Feature Exchange and Activation Region Constraint☆21Oct 23, 2023Updated 2 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆30Aug 24, 2021Updated 4 years ago
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆18May 5, 2020Updated 5 years ago
- Pytorch code for ens_adv_train☆17Jun 7, 2019Updated 6 years ago
- Code base for the EMNLP 2021 paper, "Multi-granularity Textual Adversarial Attack with Behavior Cloning".☆13Apr 18, 2022Updated 3 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 4 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆22Sep 8, 2021Updated 4 years ago
- A curated list of papers for the transferability of adversarial examples☆76Jul 8, 2024Updated last year
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆50May 26, 2021Updated 4 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- PyTorch implementation of adversarial attacks [torchattacks]☆2,148Jun 29, 2024Updated last year
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago
- ☆63Apr 2, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆81Jul 23, 2024Updated last year
- ☆11Sep 3, 2020Updated 5 years ago
- ☆14Jun 5, 2020Updated 5 years ago
- Official implementation of "Removing Batch Normalization Boosts Adversarial Training" (ICML'22)☆19Jul 20, 2022Updated 3 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- ☆20May 6, 2022Updated 3 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago