yihuang2016 / TAIGView external linksLinks
☆22Dec 12, 2022Updated 3 years ago
Alternatives and similar repositories for TAIG
Users that are interested in TAIG are comparing it to the libraries listed below
Sorting:
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago
- ☆35Dec 16, 2022Updated 3 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆87Jun 9, 2022Updated 3 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- ☆36Feb 23, 2024Updated last year
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆140Sep 11, 2025Updated 5 months ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Jun 15, 2022Updated 3 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆44Oct 12, 2023Updated 2 years ago
- ☆15Oct 21, 2021Updated 4 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Dec 29, 2021Updated 4 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Aug 17, 2023Updated 2 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Nov 17, 2022Updated 3 years ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆39Feb 29, 2024Updated last year
- Universal Perturbation Attack on differentiable no-reference image- and video-quality metrics☆14Oct 16, 2023Updated 2 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆35Mar 29, 2023Updated 2 years ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- Official codes for GRA (Accepted by ICCV2023)☆17Jul 18, 2023Updated 2 years ago
- A curated list of papers for the transferability of adversarial examples☆76Jul 8, 2024Updated last year
- ☆16Jul 25, 2022Updated 3 years ago
- [ICCV 2023] Towards Building More Robust Models with Frequency Bias☆19Feb 27, 2024Updated last year
- Code repository for CVPR2024 paper 《Pre-trained Model Guided Fine-Tuning for Zero-Shot Adversarial Robustness》☆25May 29, 2024Updated last year
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆18Jul 5, 2022Updated 3 years ago
- A paper list for localized adversarial patch research☆160Jul 28, 2025Updated 6 months ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Nov 17, 2020Updated 5 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆41Mar 11, 2022Updated 3 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆256Nov 23, 2025Updated 2 months ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆22Feb 23, 2024Updated last year
- Query-Efficient Data-Free Learning from Black-Box Models☆23Mar 20, 2023Updated 2 years ago
- Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021☆19Dec 6, 2021Updated 4 years ago
- Official Source Code of "Exploring Effective Data for Surrogate Training Towards Black-box Attack" and "STDatav2: Accessing Efficient Bla…☆20Apr 16, 2025Updated 9 months ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Oct 24, 2019Updated 6 years ago
- Paper sharing in adversary related works☆45Aug 14, 2025Updated 5 months ago