yufengzhe1 / Attack_classification_models_with_transferabilityLinks
Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:ImageNet无限制对抗攻击 决赛第四名(team name: Advers)
☆48Updated 3 years ago
Alternatives and similar repositories for Attack_classification_models_with_transferability
Users that are interested in Attack_classification_models_with_transferability are comparing it to the libraries listed below
Sorting:
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆41Updated last year
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆34Updated last year
- CVPR 2022 Workshop Robust Classification☆78Updated 2 years ago
- Practical Detection of Trojan Neural Networks☆119Updated 4 years ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack☆34Updated 7 months ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Updated 3 years ago
- [ICML22] "Revisiting and Advancing Fast Adversarial Training through the Lens of Bi-level Optimization" by Yihua Zhang*, Guanhua Zhang*, …☆65Updated 2 years ago
- [NDSS'24] Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time☆55Updated 8 months ago
- To provide the stego community with C/C++ implementations of selected feature extractors mainly targeted at H.264 steganography.☆72Updated 4 years ago
- ☆29Updated 2 months ago
- ☆58Updated last year
- ☆120Updated last week
- A comprehensive collection of resources focused on addressing and understanding hallucination phenomena in MLLMs.☆34Updated last year
- ☆96Updated 3 years ago
- ☆33Updated 4 months ago
- Improved techniques for optimization-based jailbreaking on large language models (ICLR2025)☆102Updated 2 months ago
- [CVPR2024] MMA-Diffusion: MultiModal Attack on Diffusion Models☆161Updated last year
- [CVPR2025🚀] Robust Message Embedding via Attention Flow-Based Steganography☆35Updated last month
- Simple Pytorch implementations of most used Generative Adversarial Network (GAN) varieties.☆84Updated 6 years ago
- Our code for paper 'The art of defense: letting networks fool the attacker', IEEE Transactions on Information Forensics and Security, 202…☆10Updated 2 years ago
- [ICLR 2023] Official Tensorflow implementation of "Distributionally Robust Post-hoc Classifiers under Prior Shifts"☆34Updated last year
- Deep Learning - Robustness - Immune System☆13Updated 3 years ago
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆130Updated 2 months ago
- YiJian-Comunity: a full-process automated large model safety evaluation tool designed for academic research☆110Updated 7 months ago
- This is the source code for paper "Unsupervised Adversarial Domain Adaptation for Cross-domain Face Presentation Attack Detection"☆78Updated 3 years ago
- [NeurIPS22] "Advancing Model Pruning via Bi-level Optimization" by Yihua Zhang*, Yuguang Yao*, Parikshit Ram, Pu Zhao, Tianlong Chen, Min…☆116Updated 2 years ago
- ☆74Updated this week
- A Second-Order Approach to Learning with Instance-Dependent Label Noise (CVPR'21 oral)☆42Updated 2 years ago
- [ICLR2021] Official Pytorch implementation of "When Optimizing f-Divergence is Robust with Label noise"☆67Updated 2 years ago
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆28Updated 10 months ago