video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning
☆15Oct 25, 2021Updated 4 years ago
Alternatives and similar repositories for EARL
Users that are interested in EARL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- action recognition; video classification; LRCN; I3D☆15Aug 9, 2021Updated 4 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- The Code of ECCV2022:Enhanced Accuracy and Robustness via Multi-Teacher Adversarial Distillation☆36Oct 23, 2025Updated 5 months ago
- an efficient method for detecting adversarial image examples☆17Jun 3, 2018Updated 7 years ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago
- The Oyster series is a set of safety models developed in-house by Alibaba-AAIG, devoted to building a responsible AI ecosystem. | Oyster …☆59Sep 11, 2025Updated 6 months ago
- DeepSAVA: Sparse Adversarial Video Attacks with Spatial Transformations - BMVC 2021 & Neural Networks (2023)☆11Dec 13, 2024Updated last year
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Aug 30, 2020Updated 5 years ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆42Aug 13, 2023Updated 2 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆50Jul 6, 2022Updated 3 years ago
- ☆12Sep 14, 2020Updated 5 years ago
- ☆11Jan 4, 2022Updated 4 years ago
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆43Oct 24, 2021Updated 4 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- Machine Learning Xgboost☆16Mar 31, 2020Updated 5 years ago
- ☆16May 16, 2022Updated 3 years ago
- A preprocessor module for Snort that uses ML algorithms for pruning, clustering and finding correlation between alerts☆32Jun 27, 2019Updated 6 years ago
- [ICLR 2022] Reliable Adversarial Distillation with Unreliable Teachers☆22Feb 20, 2022Updated 4 years ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- This is Unitree Go2 simulation in NVIDIA IsaacLab/Isaac-Sim using ROS2 for Navigation and other tasks☆21Nov 26, 2025Updated 3 months ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 8 years ago
- Code and videos accompanying the paper "Flickering Adversarial Attacks against Video Recognition Networks"☆16Dec 8, 2022Updated 3 years ago
- ☆20Mar 14, 2022Updated 4 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- A white box algorithm that generate adversarial examples according to the gradient☆11May 9, 2020Updated 5 years ago
- ☆10Jan 7, 2022Updated 4 years ago
- Implementation of : Semantic Image Inpainting with Perceptual and Contextual Losses Raymond☆23Mar 4, 2020Updated 6 years ago
- Original PyTorch implementation of the AdversarialMask paper☆22Apr 16, 2023Updated 2 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- 微信小程序word, doc文件上传与下载☆22Dec 29, 2020Updated 5 years ago
- ☆32Sep 1, 2025Updated 6 months ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- Inception-I3D, Non Local finetune, hmdb51_flow☆15Oct 15, 2019Updated 6 years ago
- notes and solution about CSAPP☆29Dec 13, 2020Updated 5 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- PyTorch implementation of Spatially Transformed Adversarial Examples☆22Sep 18, 2023Updated 2 years ago