Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for adversarial attacks
adversarial-attacks
x
290 search results found
Attack Adaptive Aggregation In Federated Learning
⭐
36
This is the code for our paper `Robust Federated Learning with Attack-Adaptive Aggregation' accepted by FTL-IJCAI'21.
I Bau
⭐
36
Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''
Me Net
⭐
34
[ICML 2019] ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation
Pros Gan
⭐
33
[CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"
Provably Robust Boosting
⭐
32
Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]
Wacv 2024 Papers
⭐
32
WACV 2024 Papers: Discover cutting-edge research from WACV 2024, the leading computer vision conference. Stay updated on the latest in computer vision and deep learning, with code included. ⭐ support visual intelligence development!
Rsgnn
⭐
32
An official PyTorch implementation of "Towards Robust Graph Neural Networks for Noisy Graphs with Sparse Labels" (WSDM 2022))
Tafim
⭐
32
TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation (ECCV 2022)
Fame
⭐
31
Framework for Adversarial Malware Evaluation.
Acl18_results
⭐
30
Code to reproduce results in our ACL 2018 paper "Did the Model Understand the Question?"
Gd Uap
⭐
30
Generalized Data-free Universal Adversarial Perturbations
Vibraniumdome
⭐
29
The world's first open source LLM Applications Firewall.
Popqorn
⭐
29
An Algorithm to Quantify Robustness of Recurrent Neural Networks
Lbgat
⭐
29
Learnable Boundary Guided Adversarial Training (ICCV2021)
Audio Deepfake Adversarial Attacks
⭐
29
Implementation of "Defense against Adversarial Attacks on Audio DeepFake Detection"
Gia Hao
⭐
29
[ICLR 2022] Understanding and Improving Graph Injection Attack by Promoting Unnoticeability
Ijcnn19attacks
⭐
29
Adversarial Attacks on Deep Neural Networks for Time Series Classification
Asrgen
⭐
28
Attacking Speaker Recognition with Deep Generative Models
Cyber Threat Profiling
⭐
28
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
Square Attack
⭐
27
Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]
Dataaug4code
⭐
27
Source Code Data Augmentation for Deep Learning: A Survey.
Rl Policies Attacks Defenses
⭐
26
Adversarial attacks on Deep Reinforcement Learning (RL)
Advanced Gradient Obfuscating
⭐
25
Take further steps in the arms race of adversarial examples with only preprocessing.
Gtrans
⭐
25
[ICLR'23] Implementation of "Empowering Graph Representation Learning with Test-Time Graph Transformation"
Gans In Action
⭐
24
"GAN 인 액션"(한빛미디어, 2020)의 코드 저장소입니다.
T3
⭐
24
[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
Well Classified Examples Are Underestimated
⭐
24
Code for the AAAI 2022 publication "Well-classified Examples are Underestimated in Classification with Deep Neural Networks"
Neural Ode Metasolver
⭐
24
Supplementary code for the paper "Meta-Solver for Neural Ordinary Differential Equations" https://arxiv.org/abs/2103.08561
G Nia
⭐
23
G-NIA model from "Single Node Injection Attack against Graph Neural Networks" (CIKM 2021)
Triple Wins
⭐
22
[ICLR 2020] ”Triple Wins: Boosting Accuracy, Robustness and Efficiency Together by Enabling Input-Adaptive Inference“
Rtaa
⭐
22
[ECCV2020] Robust Tracking against Adversarial Attacks
Gnnguard
⭐
22
Defending graph neural networks against adversarial attacks (NeurIPS 2020)
Sec4sr
⭐
22
Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speaker Recognition Systems'
Advdrop
⭐
22
Code for "Adversarial attack by dropping information." (ICCV 2021)
Sparse Rs
⭐
21
Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks
Style Atk
⭐
21
Author implementation of Exploring Adversarial Fake Images on Face Manifold (CVPR 2021 oral)
Emssl
⭐
21
[MICCAI 2022 Best Paper Finalist] Bayesian Pseudo Labels: Expectation Maximization for Robust and Efficient Semi Supervised Segmentation
Diagnosere
⭐
21
Source code and dataset for the CCKS201 paper "On Robustness and Bias Analysis of BERT-based Relation Extraction"
Geometric_adv
⭐
21
Geometric Adversarial Attacks and Defenses on 3D Point Clouds (3DV 2021)
Catastrophic Overfitting
⭐
20
Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]
Speakerguard
⭐
20
a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition" accepted by TDSC
Adversarial Point Perturbations On 3d Objects
⭐
19
New distributional and shape attacks on neural networks that process 3D point cloud data.
Robrank
⭐
18
Adversarial Attack and Defense in Deep Ranking, arXiv:2106.03614
Code Soup
⭐
18
This is a collection of algorithms and approaches used in the book adversarial deep learning
Torchattack
⭐
18
🛡 A set of adversarial attacks in PyTorch
Discreteblockbayesattack
⭐
18
Official PyTorch implementation of "Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization" (ICML'22)
Fab Attack
⭐
18
Code for FAB-attack
Adv Part Model
⭐
18
Code for a research paper "Part-Based Models Improve Adversarial Robustness" (ICLR 2023)
Advrank
⭐
17
Adversarial Ranking Attack and Defense, ECCV, 2020.
Bluff
⭐
16
Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks
Ga Attack
⭐
16
SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.
Petgen
⭐
16
A PyTorch implementation of the ACM SIGKDD 2021 paper titled "PETGEN: Personalized Text Generation Attack on Deep Sequence Embedding-based Classification Models"
Domain Shift Robustness
⭐
16
Code for the paper "Addressing Model Vulnerability to Distributional Shifts over Image Transformation Sets", ICCV 2019
Csa
⭐
16
Official implementation of CVPR2020 Paper "Cooling-Shrinking Attack"
Bert Probe
⭐
16
BERT Probe: A python package for probing attention based robustness to character and word based adversarial evaluation. Also, with recipes of implicit and explicit defenses against character-level attacks.
Mesh Attack
⭐
16
our code for paper '3D Adversarial Attacks Beyond Point Cloud '
Zoo_attack_pytorch
⭐
16
This repository contains the PyTorch implementation of Zeroth Order Optimization Based Adversarial Black Box Attack (https://arxiv.org/abs/1708.03999)
Vllm Safety Benchmark
⭐
15
Official PyTorch Implementation of "How Many Unicorns Are in This Image? A Safety Evaluation Benchmark for Vision LLMs"
Composite Adv
⭐
15
[CVPR23] "Towards Compositional Adversarial Robustness: Generalizing Adversarial Training to Composite Semantic Perturbations" by Lei Hsiung, Yun-Yun Tsai, Pin-Yu Chen, and Tsung-Yi Ho.
Natural Color Fool
⭐
15
This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](https://arxiv.org/abs/2210.02041).
Attack Imagenet
⭐
15
No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.
Leba
⭐
15
[NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback
Fgsm Pytorch
⭐
15
A pytorch implementation of "Explaining and harnessing adversarial examples"
Augmented_lagrangian_adversarial_attacks
⭐
14
Code for the ICCV 2021 paper "Augmented Lagrangian Adversarial Attacks"
Contranet
⭐
14
This is the official implementation of ContraNet (NDSS2022).
Chainer Adversarial Examples
⭐
14
Adversarial attack methods, FGSM and TGSM, implemented in Chainer
Sga
⭐
14
Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023]
Transfer_attack_rap
⭐
14
Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)
Advpc
⭐
14
AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds (ECCV 2020)
Mcs2018_solution
⭐
14
Watchtower
⭐
14
AIShield Watchtower: Dive Deep into AI's Secrets! 🔍 Open-source tool by AIShield for AI model insights & vulnerability scans. Secure your AI supply chain today! ⚙️🛡️
Segmentandcomplete
⭐
14
Official implementation of Segmentation and Complete (SAC) defense.
Pcfa
⭐
13
[ECCV 2022 Oral] Source code for "A Perturbation-Constrained Adversarial Attack for Evaluating the Robustness of Optical Flow"
Mdattack
⭐
13
Textattack Search Benchmark
⭐
13
EMNLP BlackBox NLP 2020: Searching for a Search Method: Benchmarking Search Algorithms for Generating NLP Adversarial Examples
Treeverification
⭐
13
[NeurIPS 2019] H. Chen*, H. Zhang*, S. Si, Y. Li, D. Boning and C.-J. Hsieh, Robustness Verification of Tree-based Models (*equal contribution)
Pgd Pytorch
⭐
13
A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"
Adversarial Ml 101
⭐
13
A beginner friendly repository for getting started with adversarial machine learning in PyTorch
St Data
⭐
13
Official Source Code of the paper "Exploring Effective Data for Surrogate Training Towards Black-box Attack", which is accepted by CVPR 2022
Dgslow
⭐
13
Codebase for the ACL 2023 paper: White-Box Multi-Objective Adversarial Attack on Dialogue Generation.
Simp Gcn
⭐
12
Implementation of the WSDM 2021 paper "Node Similarity Preserving Graph Convolutional Networks"
Bert Adv Embed
⭐
12
Adversarial perturbations on word embeddings of BERT
Ssa
⭐
12
Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples
Contrastive Poisoning
⭐
12
[ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning
Adverserial_attack
⭐
12
Different Adversarial attack methods implemented in PyTorch on CIFAR-10 Dataset
Cool Papers In Pytorch
⭐
12
Reimplementing cool papers in PyTorch...
Adv Reid
⭐
12
Metric Adversarial Attacks and Defense
Robustbnns
⭐
12
Code for paper "Robustness of Bayesian Neural Networks to Gradient-Based Attacks"
Robust Principles
⭐
12
Robust Principles: Architectural Design Principles for Adversarially Robust CNNs
Face Adversarial Attack
⭐
12
An easy approach for the competition "Facial Adversary Examples" in TIANCHI
Fooling_network_interpretation
⭐
12
Official PyTorch implementation for our ICCV 2019 paper - Fooling Network Interpretation in Image Classification
Sparse Imperceivable Attacks
⭐
12
Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).
Tree Ensemble Attack
⭐
11
[NeurIPS 2020] Code for "An Efficient Adversarial Attack for Tree Ensembles"
3d Neural Network Adversarial Attacks
⭐
11
Research on adversarial attacks and defenses for deep neural network 3D point cloud classifiers like PointNet and PointNet++.
Leveraging Adversarial Examples To Quantify Membership Information Leakage
⭐
11
Adversarial_attacks_and_defense_neurips2022
⭐
11
A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.
Uap_attack_on_quality_metrics
⭐
11
Universal Perturbation Attack on differentiable no-reference image- and video-quality metrics
3d_adversarial_logo
⭐
11
[Preprint] "Can 3D Adversarial Logos Cloak Humans?"
Query Attack
⭐
11
A Query Efficient Natural Language Attack in a Black Box Setting
Bev Attack
⭐
10
[TMLR'24] On the Adversarial Robustness of Camera-based 3D Object Detection
101-200 of 290 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.