☆16Dec 12, 2022Updated 3 years ago
Alternatives and similar repositories for PhantomSponges
Users that are interested in PhantomSponges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51May 9, 2025Updated 10 months ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆133Apr 4, 2023Updated 2 years ago
- A Paperlist of Adversarial Attack on Object Detection☆124Mar 16, 2023Updated 3 years ago
- Implementation of AAAI 2022 Paper: Context-Aware Transfer Attacks for Object Detection☆20Feb 28, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆52Feb 27, 2021Updated 5 years ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆24Feb 23, 2024Updated 2 years ago
- ☆10Nov 5, 2022Updated 3 years ago
- Code repository for Ensemble-based Blackbox Attacks on Dense Prediction (EBAD), CVPR 2023☆28May 17, 2024Updated last year
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆43Oct 24, 2021Updated 4 years ago
- ☆16Mar 24, 2025Updated last year
- ☆22Jan 12, 2024Updated 2 years ago
- Adversarial attack to detectors☆46Oct 23, 2021Updated 4 years ago
- A Man-in-the-Middle Attack against Object Detection.☆13May 21, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- [ICCV 2023] Towards Building More Robust Models with Frequency Bias☆19Feb 27, 2024Updated 2 years ago
- A very limited implementation of arXiv:1904.00759☆13Dec 2, 2019Updated 6 years ago
- Generate Rain / Haze synthetic data for training☆10Nov 14, 2016Updated 9 years ago
- [ICCV 2023] Code for "Distracting Downpour: Adversarial Weather Attacks for Motion Estimation"☆18Aug 17, 2023Updated 2 years ago
- https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/☆20May 9, 2022Updated 3 years ago
- TextCenGen introduces a dynamic adaptation of the blank region for text-friendly image generation, and enhances T2I model outcomes on arb…☆38Jul 7, 2025Updated 8 months ago
- Type-Specific Adversarial Attack for Object Detection☆13Aug 27, 2021Updated 4 years ago
- [ICML 2024] Sparse Model Inversion: Efficient Inversion of Vision Transformers with Less Hallucination☆14Apr 29, 2025Updated 10 months ago
- Official implementation for Neural networks with recurrent generative feedback (NeurIPS 2020).☆22Nov 10, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Apr 5, 2023Updated 2 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- [CVPR 2025 Highlight] FIMA-Q: Post-Training Quantization for Vision Transformers by Fisher Information Matrix Approximation☆25Jun 16, 2025Updated 9 months ago
- ☆33Sep 9, 2020Updated 5 years ago
- [CVPR 2025] QuartDepth☆17Mar 24, 2025Updated last year
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆117Oct 11, 2024Updated last year
- Tor consensus and server descriptor parser☆14Nov 24, 2022Updated 3 years ago
- ☆15Jan 12, 2026Updated 2 months ago
- This is a Pytorch Implementation of the DASP algorithm from the paper "Explaining Deep Neural Networks with a Polynomial Time Algorithm f…☆11Jun 12, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Jun 8, 2021Updated 4 years ago
- ☆69Mar 2, 2026Updated 3 weeks ago
- Source code of our TNNLS paper "Boosting Convolutional Neural Networks with Middle Spectrum Grouped Convolution"☆12Apr 14, 2023Updated 2 years ago
- Adversarial Driving v.s. Autonomous Driving.☆23Jul 29, 2023Updated 2 years ago
- ☆13Jul 14, 2025Updated 8 months ago
- [ICML 2025] Official PyTorch implementation of "NegMerge: Sign-Consensual Weight Merging for Machine Unlearning"☆15Nov 25, 2025Updated 4 months ago
- ☆15Apr 11, 2024Updated last year