Official Source Code of "Exploring Effective Data for Surrogate Training Towards Black-box Attack" and "STDatav2: Accessing Efficient Black-Box Stealing for Adversarial Attacks".
☆21Apr 16, 2025Updated 11 months ago
Alternatives and similar repositories for ST-Data
Users that are interested in ST-Data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Query-Efficient Data-Free Learning from Black-Box Models☆23Mar 20, 2023Updated 3 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆75Apr 1, 2024Updated last year
- ☆34Mar 28, 2022Updated 3 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆114Dec 8, 2022Updated 3 years ago
- Official source code of the paper: Perturbation Seeking Generative Adversarial Networks: A Defense Framework for Remote Sensing Image Sce…☆14Jan 6, 2022Updated 4 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- Knowledge distillation (KD) from a decision-based black-box (DB3) teacher without training data.☆22May 3, 2022Updated 3 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆59Jun 18, 2021Updated 4 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- ☆24Oct 1, 2022Updated 3 years ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020)☆10Jan 5, 2022Updated 4 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- A novel data-free model stealing method based on GAN☆133Oct 11, 2022Updated 3 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- Code for fitting masks to face images in the wild☆10Jul 29, 2021Updated 4 years ago
- Codes for Weakly Supervised Rotation-Invariant Aerial Object Detection Network☆32May 30, 2023Updated 2 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- This is the code for CVPR2022 paper "Modeling Motion with Multi-Modal Features for Text-Based Video Segmentation"☆19Feb 19, 2023Updated 3 years ago
- Paper sharing in adversary related works☆46Aug 14, 2025Updated 7 months ago
- Black-box Few-shot Knowledge Distillation☆14Jul 19, 2022Updated 3 years ago
- ☆12Jan 15, 2024Updated 2 years ago
- [ECCV 2024] Towards Stable 3D Object Detection☆49Jul 10, 2024Updated last year
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- The code for OpenmmLab challenge.☆91Feb 9, 2023Updated 3 years ago
- [AAAI-2022] Up to 100x Faster Data-free Knowledge Distillation☆76Oct 24, 2022Updated 3 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- A PyTorch implementation of Unsupervised Face Normalization with Extreme Pose and Expression in the Wild☆17Apr 29, 2021Updated 4 years ago
- [CVPR-2024] NAYER: Noisy Layer Data Generation for Efficient and Effective Data-free Knowledge Distillation☆16Oct 19, 2024Updated last year
- Anchor-free Oriented Proposal Generator for Object Detection☆65Oct 30, 2021Updated 4 years ago
- PyTorch implementation of Adversarial Patch☆15Jul 6, 2023Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- ☆12Apr 26, 2024Updated last year