Update pipeline tag and add usage instructions and security statement
#1
by
nielsr
HF Staff
- opened
README.md
CHANGED
@@ -1,14 +1,13 @@
|
|
1 |
---
|
2 |
library_name: XTransferBench
|
3 |
license: mit
|
4 |
-
pipeline_tag:
|
5 |
tags:
|
6 |
- not-for-all-audiences
|
7 |
- pytorch_model_hub_mixin
|
8 |
- model_hub_mixin
|
9 |
---
|
10 |
|
11 |
-
|
12 |
# X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
|
13 |
<div align="center">
|
14 |
<a href="https://arxiv.org/abs/2505.05528" target="_blank"><img src="https://img.shields.io/badge/arXiv-b5212f.svg?logo=arxiv" alt="arXiv"></a>
|
@@ -19,7 +18,7 @@ Pre-trained UAP for ICML2025 paper ["X-Transfer Attacks: Towards Super Transfera
|
|
19 |
---
|
20 |
|
21 |
## X-TransferBench
|
22 |
-
X-TransferBench is an open-source benchmark that provides a comprehensive collection of UAPs/TUAPs capable of achieving
|
23 |
|
24 |
## Model Details
|
25 |
|
@@ -33,11 +32,21 @@ X-TransferBench is an open-source benchmark that provides a comprehensive collec
|
|
33 |
## Model Usage
|
34 |
|
35 |
```python
|
36 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
37 |
|
38 |
-
|
39 |
-
images = #
|
40 |
-
adv_images = attacker(images)
|
41 |
```
|
42 |
|
43 |
---
|
@@ -58,3 +67,11 @@ year={2025},
|
|
58 |
|
59 |
```
|
60 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
---
|
2 |
library_name: XTransferBench
|
3 |
license: mit
|
4 |
+
pipeline_tag: image-to-image
|
5 |
tags:
|
6 |
- not-for-all-audiences
|
7 |
- pytorch_model_hub_mixin
|
8 |
- model_hub_mixin
|
9 |
---
|
10 |
|
|
|
11 |
# X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP
|
12 |
<div align="center">
|
13 |
<a href="https://arxiv.org/abs/2505.05528" target="_blank"><img src="https://img.shields.io/badge/arXiv-b5212f.svg?logo=arxiv" alt="arXiv"></a>
|
|
|
18 |
---
|
19 |
|
20 |
## X-TransferBench
|
21 |
+
X-TransferBench is an open-source benchmark that provides a comprehensive collection of UAPs/TUAPs capable of achieving super adversarial transferability. These UAPs can simultaneously **transfer across data, domains, models**, and **tasks**. Essentially, they represent perturbations that can transform any sample into an adversarial example, effective against any model and for any task.
|
22 |
|
23 |
## Model Details
|
24 |
|
|
|
32 |
## Model Usage
|
33 |
|
34 |
```python
|
35 |
+
import XTransferBench
|
36 |
+
import XTransferBench.zoo
|
37 |
+
|
38 |
+
# List threat models
|
39 |
+
print(XTransferBench.zoo.list_threat_model())
|
40 |
+
|
41 |
+
# List UAPs under L_inf threat model
|
42 |
+
print(XTransferBench.zoo.list_attacker('linf_non_targeted'))
|
43 |
+
|
44 |
+
# Load X-Transfer with the Large search space (N=64) non-targeted
|
45 |
+
attacker = XTransferBench.zoo.load_attacker('linf_non_targeted', 'xtransfer_large_linf_eps12_non_targeted')
|
46 |
|
47 |
+
# Perturbe images to adversarial example
|
48 |
+
images = # Tensor [b, 3, h, w]
|
49 |
+
adv_images = attacker(images)
|
50 |
```
|
51 |
|
52 |
---
|
|
|
67 |
|
68 |
```
|
69 |
|
70 |
+
---
|
71 |
+
## Security and Ethical Use Statement
|
72 |
+
|
73 |
+
**The perturbations provided in this project are intended solely for research purposes.** They are shared with the academic and research community to advance understanding of super transferable attacks and defenses.
|
74 |
+
|
75 |
+
Any other use of the data, model weights, or methods derived from this project, including but not limited to unauthorized access, modification, or malicious deployment, is strictly prohibited and not endorsed by this project. The authors and contributors of this project are not responsible for any misuse or unethical applications of the provided resources. Users are expected to adhere to ethical standards and ensure that their use of this research aligns with applicable laws and guidelines.
|
76 |
+
|
77 |
+
---
|