19 skills found
Trustworthy-AI-Group / TransferAttackTransferAttack is a pytorch framework to boost the adversarial transferability for image classification.
cg563 / Simple Blackbox AttackCode for ICML 2019 paper "Simple Black-box Adversarial Attacks"
labsix / Limited Blackbox AttacksCode for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)
thong3le / Blackbox AttackBlackbox attacks for deep neural network models
sunblaze-ucb / Blackbox AttacksCode used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)
snu-mllab / Parsimonious Blackbox AttackOfficial TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)
AI-secure / QEBACode for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack
CSIPlab / EBADCode repository for Ensemble-based Blackbox Attacks on Dense Prediction (EBAD), CVPR 2023
JerryMazeyu / DRA BlackBoxAttackAn unofficial implementation of the paper《Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective》
byt3n33dl3 / .crackedauthMFA and 2FA chainers, authentication PenTesting frameworks.
RobertoFalconi / BlackBoxAttackDNNNeural Networks exam project. Machine learning algorithm: implementation of FGSM and JSMA attacks by Goodfellow and Papernot.
Trustworthy-AI-Group / BSR[CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation
blackbox-bandits / Blackbox Attacks Bandits PriorsCode for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"
Practical-Formal-Methods / DeepSearchReproduction Code for FSE Paper "DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks"
CSIPlab / BASESCode repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022
AI-secure / NonLinear BAThe code accompanying paper: Nonlinear Gradient Estimation for Query Efficient Blackbox Attack
AI-secure / PSBA[ICML 2021] "Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation" by Jiawei Zhang*, Linyi Li*, Huichen Li, Xiaolu Zhang, Shuang Yang, Bo Li
isec-tugraz / Ca Tip5family MonolithOpening the Blackbox: Collision attacks on round-reduced Tip5, Tip4, Tip4’ and Monolith.
songjinze / BlackBoxAttacker黑盒生成对抗样本 使用迭代FGSM+diversity input