AvishagS422 / PhantomSpongesView external linksLinks
☆16Dec 12, 2022Updated 3 years ago
Alternatives and similar repositories for PhantomSponges
Users that are interested in PhantomSponges are comparing it to the libraries listed below
Sorting:
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51May 9, 2025Updated 9 months ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- A Paperlist of Adversarial Attack on Object Detection☆125Mar 16, 2023Updated 2 years ago
- Implementation of AAAI 2022 Paper: Context-Aware Transfer Attacks for Object Detection☆20Feb 28, 2022Updated 3 years ago
- Code repository for Ensemble-based Blackbox Attacks on Dense Prediction (EBAD), CVPR 2023☆27May 17, 2024Updated last year
- [ICML 2024] Sparse Model Inversion: Efficient Inversion of Vision Transformers with Less Hallucination☆13Apr 29, 2025Updated 9 months ago
- ☆10Nov 5, 2022Updated 3 years ago
- [CVPR 2025 Highlight] FIMA-Q: Post-Training Quantization for Vision Transformers by Fisher Information Matrix Approximation☆25Jun 16, 2025Updated 7 months ago
- Official Implementation of Robustifying and Boosting Training-Free Neural Architecture Search☆10Mar 12, 2024Updated last year
- [CVPR 2025] QuartDepth☆16Mar 24, 2025Updated 10 months ago
- ☆18Jan 30, 2026Updated 2 weeks ago
- ☆17Dec 16, 2025Updated last month
- Source code of our TNNLS paper "Boosting Convolutional Neural Networks with Middle Spectrum Grouped Convolution"☆12Apr 14, 2023Updated 2 years ago
- Adversarial attack to detectors☆46Oct 23, 2021Updated 4 years ago
- ☆13Jul 14, 2025Updated 7 months ago
- The official code for "Advancing Multimodal Large Language Models with Quantization-Aware Scale Learning for Efficient Adaptation" | [MM2…☆14Dec 7, 2024Updated last year
- ☆15Jan 12, 2026Updated last month
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- The implementation for FREE-Merging: Fourier Transform for Model Merging with Lightweight Experts (ICCV25)☆14Jun 26, 2025Updated 7 months ago
- Code for Optimized Arrhythmia Detection on Ultra-Edge Devices☆11May 26, 2022Updated 3 years ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆116Oct 11, 2024Updated last year
- ☆13May 31, 2024Updated last year
- [ICCAD 2025] Squant☆15Jul 3, 2025Updated 7 months ago
- ☆12Jul 30, 2025Updated 6 months ago
- Official PyTorch implementation of the paper entitled 'Self Attentive Pooling for Efficient Deep Learning'.☆13May 3, 2024Updated last year
- ☆13Jul 25, 2024Updated last year
- ☆11Sep 20, 2024Updated last year
- The CCMO belongs to the category of multi-objective evolutionary algorithms (MOEAs). CCMO is a powerful algorithm to solve the constraine…☆13Jul 23, 2023Updated 2 years ago
- Beyond Gradient Descent for Regularized Segmentation Losses☆11Sep 27, 2019Updated 6 years ago
- ☆17Mar 10, 2025Updated 11 months ago
- First Latency-Aware Competitive LLM Agent Benchmark☆26Jun 3, 2025Updated 8 months ago
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆43Oct 24, 2021Updated 4 years ago
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆13Jun 20, 2023Updated 2 years ago
- ☆15Mar 24, 2025Updated 10 months ago
- ☆14Aug 19, 2024Updated last year
- A simple random onion site scanner with onion list☆16Aug 7, 2018Updated 7 years ago
- ☆12Dec 22, 2023Updated 2 years ago
- ☆23Mar 17, 2025Updated 10 months ago
- MICRO 2024 Evaluation Artifact for FuseMax☆16Aug 26, 2024Updated last year