zihaoliu123 / Feature-Distillation-DNN-Oriented-JPEG-Compression-Against-Adversarial-Examples
☆18Updated 2 years ago
Alternatives and similar repositories for Feature-Distillation-DNN-Oriented-JPEG-Compression-Against-Adversarial-Examples:
Users that are interested in Feature-Distillation-DNN-Oriented-JPEG-Compression-Against-Adversarial-Examples are comparing it to the libraries listed below
- ☆26Updated 2 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Updated 4 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆27Updated 3 years ago
- ☆70Updated 3 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Updated 3 years ago
- ☆40Updated last year
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆82Updated 2 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Updated 2 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆71Updated 4 years ago
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆19Updated last month
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆29Updated 3 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆25Updated 2 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 5 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆19Updated 4 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆24Updated 3 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated 2 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆11Updated last year
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Updated 4 years ago
- Pytorch implementation for MagNet: a Two-Pronged Defense against Adversarial Examples☆15Updated 5 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Updated 5 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Updated 4 years ago
- ☆22Updated 2 years ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆19Updated 8 months ago
- a pytorch version of AdvGAN for cifar10 dataset☆10Updated 5 years ago
- ☆35Updated 2 years ago
- ☆58Updated 2 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Updated 2 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆28Updated 4 years ago