Code repository for Ensemble-based Blackbox Attacks on Dense Prediction (EBAD), CVPR 2023
☆28May 17, 2024Updated last year
Alternatives and similar repositories for EBAD
Users that are interested in EBAD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of AAAI 2022 Paper: Context-Aware Transfer Attacks for Object Detection☆19Feb 28, 2022Updated 4 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆117Oct 11, 2024Updated last year
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- The implementation of our NeurIPS 2024 paper "DarkSAM: Fooling Segment Anything Model to Segment Nothing".☆13Nov 4, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Official repository for Targeted Unlearning with Single Layer Unlearning Gradient (SLUG), ICML 2025☆15Aug 10, 2025Updated 7 months ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆132Apr 4, 2023Updated 3 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆35Mar 16, 2022Updated 4 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 3 months ago
- A simple Tensorflow implementation of DCGAN for Waifu face images generation.☆11Mar 4, 2019Updated 7 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆466Feb 27, 2026Updated last month
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Jun 8, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted Attacks(CVPR2023)☆19Jun 19, 2023Updated 2 years ago
- Adversarial attack to detectors☆46Oct 23, 2021Updated 4 years ago
- This is the repository for USENIX Security 2023 paper "Hard-label Black-box Universal Adversarial Patch Attack".☆15Sep 5, 2023Updated 2 years ago
- ☆16Dec 12, 2022Updated 3 years ago
- A simple tutorial on adversarial attacks against deep neural networks☆34Nov 10, 2025Updated 4 months ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- Official codes for GRA (Accepted by ICCV2023)☆17Jul 18, 2023Updated 2 years ago
- [CVPR23] "Towards Compositional Adversarial Robustness: Generalizing Adversarial Training to Composite Semantic Perturbations" by Lei Hsi…☆24Sep 17, 2025Updated 6 months ago
- ☆10Nov 5, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆28Sep 22, 2022Updated 3 years ago
- Code for the CVPR 2023 paper "Proximal Splitting Adversarial Attacks for Semantic Segmentation"☆23Apr 30, 2024Updated last year
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 4 years ago
- ☆91Apr 1, 2026Updated last week
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆28Jul 18, 2023Updated 2 years ago
- The official PyTorch implementation of "Adversarially-Aware Robust Object Detector"☆65Sep 22, 2022Updated 3 years ago
- ☆13Aug 26, 2024Updated last year
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆43Oct 24, 2021Updated 4 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆169Jul 2, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Nov 28, 2023Updated 2 years ago
- Official release of code for the paper RL is a hammer and LLMs are nails A simple RL approach to stronger prompt injection attacks☆42Feb 11, 2026Updated last month
- ☆13Dec 9, 2022Updated 3 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated 2 years ago
- The implementation of our ACM MM 2023 paper "AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning"☆99Aug 25, 2023Updated 2 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆66Mar 22, 2025Updated last year