A Survey of Physical Adversarial Attack in Computer Vision
☆30Jul 23, 2024Updated last year
Alternatives and similar repositories for Survey-of-Physical-adversarial-attack
Users that are interested in Survey-of-Physical-adversarial-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆100Jun 30, 2025Updated 9 months ago
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- ☆28Sep 22, 2022Updated 3 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- [ICML 2024] RAUCA: A robust and accurate adversarial camouflage generation method☆25Nov 29, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆117Oct 31, 2023Updated 2 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆26Aug 31, 2022Updated 3 years ago
- A paper list for localized adversarial patch research☆163Jul 28, 2025Updated 8 months ago
- ☆18Dec 5, 2025Updated 3 months ago
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆31Jul 21, 2025Updated 8 months ago
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆33Oct 9, 2023Updated 2 years ago
- ☆10Jun 13, 2025Updated 9 months ago
- The Pytorch implementation for the paper "Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection"☆20Mar 9, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- Official Implement of the Paper "Continuous Remote Sensing Image Super-Resolution based on Context Interaction in Implicit Function Space…☆43May 10, 2023Updated 2 years ago
- Official Pytorch implementation for our AAAI 2023 paper HOTCOLD Block: Fooling Thermal Infrared Detectors with a Novel Wearable Design☆36Oct 6, 2025Updated 5 months ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Jun 8, 2021Updated 4 years ago
- Official code implement of "Your Diffusion Model is Secretly a Certifiably Robust Classifier"☆18Feb 2, 2024Updated 2 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆64Sep 16, 2025Updated 6 months ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆42Aug 13, 2023Updated 2 years ago
- official Pytorch implementation of paper 'Improving transferability of 3D adversarial attacks with scale and shear transformations', Info…☆11Apr 26, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆44May 8, 2020Updated 5 years ago
- ☆31Apr 17, 2024Updated last year
- ☆13May 24, 2023Updated 2 years ago
- (ICLR 2025 spotlight) "Poison-splat: Computation Cost Attack on 3D Gaussian Splatting"☆78Feb 13, 2025Updated last year
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆260Nov 23, 2025Updated 4 months ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago
- ☆18Sep 24, 2020Updated 5 years ago
- Feature Separation and Recalibration (CVPR 2023 Highlights)☆34Dec 12, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [ICML 2025] Fast and Low-Cost Genomic Foundation Models via Outlier Removal.☆18Jun 19, 2025Updated 9 months ago
- [IEEE TGRS 2023 🔥] A Decoupling Paradigm With Prompt Learning for Remote Sensing Image Change Captioning'☆38Jul 27, 2025Updated 8 months ago
- An audio steganalysis method based on CNN in the time domain.☆12Feb 25, 2021Updated 5 years ago
- CVPR 2023 generalist☆16Oct 25, 2023Updated 2 years ago
- ☆21Mar 18, 2026Updated last week
- PyTorch codes for "Heterogeneous Mixture of Experts for Remote Sensing Image Super-Resolution", IEEE GRSL, 2025.☆26Aug 30, 2025Updated 7 months ago
- Attacking Vision based Perception in End-to-end Autonomous Driving Models☆33Nov 22, 2022Updated 3 years ago