-
Hi! Thanks for sharing your work.
I would like to know are adversarial attacks also included in the benchmark? If yes, which type of attacks have been included?
-
[Adversarial label-flipping attack and defense for graph neural networks](https://ieeexplore.ieee.org/abstract/document/9338299/)
[Adversarial_Label-Flipping_Attack_and_Defense_for_Graph_Neural_Netwo…
-
Hi,
I'm interested in attacking yolov8 to test methods for better resistance.
The yolo model is not accepted in torchattacks. Instead, I tried to import and attack a pre-implemented model from t…
-
What will prevent a malicious website from abusing FLOC and force users into arbitrary cohort?
Some ideas:
- Create iframes outside of the viewport and make them navigate many times to specific we…
-
## Issue
The task is to formulate non-SFT attacks in order to test the robustness of a defence solution.
The attack will need to run with an arbitrary domain like medical advice.
Types of Attac…
-
Hi,
I read your paper yesterday and found it impressive. I’m planning to replicate some of the experiments. However, when I used task arithmetic to evaluate the attack on the ViT-L-14 model and mer…
-
When I test boundary attack in target=True settings and provide the target label like this:
boundary = BoundaryAttack(estimator= kclassifier,
batch_siz…
-
Hi author,
When I was reproducing the code, I found that after saving the attacked adversarial examples, there was a significant difference between the attacked adversarial samples and the original i…
-
Hi,
Thanks for the great repo. I was wondering if you could share the code for generating the adversarial images for Attack A2 in the paper? I'm having some difficulties trying to set this up.
…
-
- Change code for the whole dataset
- Spanish English, French, Galego
- See the reference: https://arxiv.org/pdf/2210.17316.pdf
- Maybe later do later iterative noise addition + eps as SNR paramete…