Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks
☆16May 26, 2020Updated 5 years ago
Alternatives and similar repositories for AAA-Pix2pix
Users that are interested in AAA-Pix2pix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TIP2019-GazeGAN Saliency Model☆35May 6, 2020Updated 6 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- A Progressively Enhanced Network for Video Satellite Imagery Super-Resolution☆13Sep 11, 2018Updated 7 years ago
- ☆14Apr 18, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆136May 29, 2018Updated 7 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 7 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60May 14, 2019Updated 6 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- This repository contains the files used for our Interspeech 2017 paper.☆16May 30, 2017Updated 8 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- Energy-based Dropout and Pruning of Deep Neural Networks☆10Oct 9, 2020Updated 5 years ago
- Degrade is Upgrade: Learning Degradation for Low-light Image Enhancement☆23Mar 23, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆255Oct 30, 2019Updated 6 years ago
- Secure Inference Resilient Against Malicious Clients☆14May 3, 2022Updated 4 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Nov 17, 2020Updated 5 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- Hardware & computer guide for AI: how to choose & build a computer. This guide is intended for beginers in hardware, in order to plan wh…☆10Mar 10, 2022Updated 4 years ago
- [ICLR 2022] "Sparsity Winning Twice: Better Robust Generalization from More Efficient Training" by Tianlong Chen*, Zhenyu Zhang*, Pengjun…☆40Mar 20, 2022Updated 4 years ago
- MultipleStyleCheckBoxKit have multiple style check box, due with multiple line text, network photo, local photo, useful on news vote. …☆17Mar 16, 2016Updated 10 years ago
- ☆11Feb 27, 2025Updated last year
- ☆10Mar 8, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Unsupervised Model-based Dense Face Alignment☆10Aug 27, 2020Updated 5 years ago
- ☆86Feb 6, 2021Updated 5 years ago
- ☆13Jan 5, 2021Updated 5 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆140Aug 23, 2023Updated 2 years ago
- 基于虚拟仿真环境下的自动驾驶交通标志识别第三名 方案☆10Jan 11, 2020Updated 6 years ago
- Official Implementation of "Subjective and Objective Quality of Experiment of Free Viewpoint Videos"☆12Oct 27, 2022Updated 3 years ago
- Image Manipulation Detection and Localization☆10Aug 10, 2023Updated 2 years ago
- Calculates the DCT at different frequencies in 2D☆15Nov 4, 2018Updated 7 years ago
- PCNet: Progressive Coupled Network for Real-Time Image Deraining☆29Jul 7, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Apr 1, 2024Updated 2 years ago
- Code for computing the hidden biases in deep networks and its applications☆14Feb 23, 2023Updated 3 years ago
- StrAttack, ICLR 2019☆33Aug 4, 2019Updated 6 years ago
- This repository is the official implementation of our paper Robust Diffusion Model-Generated Image Detection with CLIP, accepted by MIPR …☆11Jun 13, 2024Updated last year
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Dec 12, 2020Updated 5 years ago
- A demo for VR-SGD(Comparing to some state-of-the-art algorithms).☆13Mar 5, 2018Updated 8 years ago
- Implementation of a Siamese Neural Network (in Tensorflow) that defines a similarity score between a pair of person images.☆12Sep 25, 2020Updated 5 years ago