Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".
☆16Feb 21, 2023Updated 3 years ago
Alternatives and similar repositories for X-adv
Users that are interested in X-adv are comparing it to the libraries listed below
Sorting:
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated last year
- ☆82Oct 24, 2022Updated 3 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Benchmark of robust self-supervised learning (RobustSSL) methods & Code for AutoLoRa (ICLR 2024).☆19Dec 10, 2025Updated 2 months ago
- PyTorch implementation of Adversarial Patch☆15Jul 6, 2023Updated 2 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- ☆86Oct 16, 2025Updated 4 months ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- ☆25Jun 9, 2022Updated 3 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- PIDray: A Large-scale X-ray Benchmark for Real-World Prohibited Item Detection☆30Jul 8, 2023Updated 2 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- Real-Time Network Intrusion Detection Framework☆13Mar 21, 2025Updated 11 months ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Jun 29, 2025Updated 8 months ago
- Veri yapıları dersi 2022☆10Jan 7, 2023Updated 3 years ago
- Code Used for Fall 2019 Business Data Science Final Project, where our team developed a predictive model to see if customers would purcha…☆10Sep 3, 2020Updated 5 years ago
- Learn OpenCV : C++ and Python Examples☆10Mar 14, 2019Updated 6 years ago
- ☆10Mar 8, 2025Updated 11 months ago
- UCI's first women-centric hackathon!☆11Feb 27, 2026Updated last week
- Governance UI Landing Page - realms.today☆12Feb 9, 2025Updated last year
- Code for Federated Generalized Bayesian Learning via Distributed Stein Variational Gradient Descent☆10Nov 19, 2020Updated 5 years ago
- Secure and Scalable Federated Learning using Serverless Computing☆12Jan 31, 2024Updated 2 years ago
- todo: desc☆11Aug 12, 2021Updated 4 years ago
- Record my learning progress.☆10Mar 1, 2022Updated 4 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- 🧟 The hackathon where 150 teens built fun tech to survive the zombie apocalypse.☆13Mar 14, 2025Updated 11 months ago
- Secure Inference Resilient Against Malicious Clients☆15May 3, 2022Updated 3 years ago
- 工业级中文语音识别系统电子书☆13Oct 30, 2020Updated 5 years ago
- 关于Fault-Tolerant Federated Reinforcement Learning with Theoretical Guarantee这篇论文的详细代码解读☆11Dec 27, 2023Updated 2 years ago
- Landing page for a studio built with Nextjs, GSAP and framer-motion☆15Jan 18, 2026Updated last month
- Capturing and Logging OpenVR☆12Mar 9, 2024Updated last year
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago