DIG-Beihang / AISafetyView external linksLinks
☆82Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for AISafety
Users that are interested in AISafety are comparing it to the libraries listed below
Sorting:
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 2 years ago
- The first comprehensive Robustness investigation benchmark on large-scale dataset ImageNet regarding ARchitecture design and Training tec…☆150Feb 4, 2026Updated last week
- ☆12Sep 22, 2023Updated 2 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago
- The official PyTorch implementation of "Adversarially-Aware Robust Object Detector"☆64Sep 22, 2022Updated 3 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Jun 14, 2018Updated 7 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- ☆22Nov 19, 2021Updated 4 years ago
- Code for the CVPR 2023 paper "Proximal Splitting Adversarial Attacks for Semantic Segmentation"☆22Apr 30, 2024Updated last year
- CVPR 2021 | Code to reproduce the results of the paper: A Khakzar, S Baselizadeh, S Khanduja, C Rupprecht, ST Kim, N Navab, Neural Respon…☆12Jun 23, 2021Updated 4 years ago
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆14Nov 3, 2024Updated last year
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆28Nov 25, 2022Updated 3 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- [NeurIPS 2022] "Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks"☆13Nov 11, 2022Updated 3 years ago
- [NLPCC'23] ZeroGen: Zero-shot Multimodal Controllable Text Generation with Multiple Oracles PyTorch Implementation☆14Oct 7, 2023Updated 2 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- official Pytorch implementation of paper 'Improving transferability of 3D adversarial attacks with scale and shear transformations', Info…☆11Apr 26, 2024Updated last year
- ☆11Apr 27, 2022Updated 3 years ago
- [Tool] AutoRec (2015) PyTorch Implementation☆10Mar 1, 2020Updated 5 years ago
- Paper list of Adversarial Examples☆52Oct 12, 2023Updated 2 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆524Oct 15, 2023Updated 2 years ago
- ☆86Nov 3, 2025Updated 3 months ago
- The repo is a source code for the project on Adversarial examples on Semantic Segmentation Networks☆13Sep 12, 2021Updated 4 years ago
- Pytorch最小实践☆17Jun 27, 2022Updated 3 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- The code of "Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds" CVPR 2024☆36Mar 23, 2024Updated last year
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆35Mar 8, 2021Updated 4 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆46Aug 12, 2023Updated 2 years ago
- ☆14Feb 3, 2026Updated last week
- Official Code for Efficient and Effective Augmentation Strategy for Adversarial Training (NeurIPS-2022)☆17Mar 29, 2023Updated 2 years ago
- Towards Defending against Adversarial Examples via Attack-Invariant Features☆12Oct 12, 2023Updated 2 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆16May 26, 2020Updated 5 years ago
- ☆63Apr 2, 2021Updated 4 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆37Aug 17, 2020Updated 5 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago