An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.
-
Updated
Feb 20, 2024 - Python
An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.
Revisiting Transferable Adversarial Image Examples (arXiv 2023)
[TMLR 2023] as a featured article (spotlight 🌟 or top 0.01% of the accepted papers). In this study, we systematically examine the robustness of both traditional and learned perceptual similarity metrics to imperceptible adversarial perturbations.
Add a description, image, and links to the transferable-attacks topic page so that developers can more easily learn about it.
To associate your repository with the transferable-attacks topic, visit your repo's landing page and select "manage topics."