some baseline attack method by pytorch
☆11Oct 13, 2021Updated 4 years ago
Alternatives and similar repositories for adversarial_attack
Users that are interested in adversarial_attack are comparing it to the libraries listed below
Sorting:
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Dec 29, 2021Updated 4 years ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- Adversarial Attack on Visual Object Tracking☆15May 13, 2021Updated 4 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- ☆37Jul 3, 2024Updated last year
- 开发成长路上☆10Dec 25, 2018Updated 7 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Unofficial pytorch implementation of miSRGAN, in paper "3D Registration of pre-surgical prostate MRI and histopathology images via super-…☆11Dec 6, 2023Updated 2 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆95Dec 1, 2022Updated 3 years ago
- ☆15Feb 18, 2024Updated 2 years ago
- ☆12May 4, 2025Updated 10 months ago
- Code for the ICLR 2022 paper "Attacking deep networks with surrogate-based adversarial black-box methods is easy"☆10Oct 16, 2025Updated 5 months ago
- Code for paper Edge-Enhanced Dilated Residual Attention Network for Multimodal Medical Image Fusion☆12Nov 18, 2024Updated last year
- Multimodal Medical Image Fusion based on Multi-channel Aggregated Network☆11Jan 26, 2025Updated last year
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- C training for 17 fresh man☆14Oct 28, 2017Updated 8 years ago
- 学习笔记☆17Jul 9, 2019Updated 6 years ago
- Physics simulation: cloth and simple procedural objects with collision detection. Animated using second-order methods.☆17Aug 24, 2017Updated 8 years ago
- ☆16Mar 31, 2025Updated 11 months ago
- automatic data race analysis for Linux device drivers☆12Jul 27, 2016Updated 9 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- Official repository for "Boosting Adversarial Transferability using Dynamic Cues " (ICLR 2023)☆20Aug 24, 2023Updated 2 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- PyTorch adversarial attack baselines for ImageNet, CIFAR10, and MNIST (state-of-the-art attacks comparison)☆20Mar 12, 2021Updated 5 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆36Sep 19, 2020Updated 5 years ago
- Keys for Programming Assignments of Coursera Course Deep Learning Specialization by Andrew Ng☆20Jan 12, 2019Updated 7 years ago
- ECNU 校园网定时自动登录☆15Jul 24, 2024Updated last year
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆141Sep 11, 2025Updated 6 months ago
- Think about boundary: Fusing multi-level boundary information for landmark heatmap regression.☆16Oct 22, 2022Updated 3 years ago
- [ICCV 2023] Code for "Distracting Downpour: Adversarial Weather Attacks for Motion Estimation"☆18Aug 17, 2023Updated 2 years ago
- Framework for face swapping, face reenactment, face attributed☆12Dec 24, 2022Updated 3 years ago
- Improving Adversarial Robustness via Mutual Information Estimation☆11Apr 2, 2024Updated last year
- Codebase for "Exploring the Landscape of Spatial Robustness" (ICML'19, https://arxiv.org/abs/1712.02779).☆25Sep 16, 2019Updated 6 years ago
- Towards Defending against Adversarial Examples via Attack-Invariant Features☆12Oct 12, 2023Updated 2 years ago
- ☆10Aug 24, 2022Updated 3 years ago