DIG-Beihang / X-advView external linksLinks
Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".
☆16Feb 21, 2023Updated 2 years ago
Alternatives and similar repositories for X-adv
Users that are interested in X-adv are comparing it to the libraries listed below
Sorting:
- ☆12Sep 22, 2023Updated 2 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- PyTorch implementation of Adversarial Patch☆15Jul 6, 2023Updated 2 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- code for paper "Physical-World Optical Adversarial Attacks on 3D Face Recognition"☆20Oct 19, 2023Updated 2 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- ☆86Oct 16, 2025Updated 3 months ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 2 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- A robotframework library that repairs failing Robot Framework tests automatically via AI☆21Feb 5, 2026Updated last week
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 3 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- Bad Characters: Imperceptible NLP Attacks☆35Apr 9, 2024Updated last year
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Real-Time Network Intrusion Detection Framework☆13Mar 21, 2025Updated 10 months ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆46Aug 12, 2023Updated 2 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Jun 29, 2025Updated 7 months ago
- Veri yapıları dersi 2022☆10Jan 7, 2023Updated 3 years ago
- ☆10Mar 8, 2025Updated 11 months ago
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 10 months ago
- It is the official code of the AAAI-24 paper "Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain"☆17Oct 11, 2025Updated 4 months ago
- UCI's first women-centric hackathon!☆10Feb 6, 2026Updated last week
- Code Used for Fall 2019 Business Data Science Final Project, where our team developed a predictive model to see if customers would purcha…