video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning
☆15Oct 25, 2021Updated 4 years ago
Alternatives and similar repositories for EARL
Users that are interested in EARL are comparing it to the libraries listed below
Sorting:
- action recognition; video classification; LRCN; I3D☆15Aug 9, 2021Updated 4 years ago
- The Code of ECCV2022:Enhanced Accuracy and Robustness via Multi-Teacher Adversarial Distillation☆36Oct 23, 2025Updated 4 months ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- an efficient method for detecting adversarial image examples☆18Jun 3, 2018Updated 7 years ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- The Oyster series is a set of safety models developed in-house by Alibaba-AAIG, devoted to building a responsible AI ecosystem. | Oyster …☆59Sep 11, 2025Updated 5 months ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆42Aug 13, 2023Updated 2 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Aug 30, 2020Updated 5 years ago
- A white box algorithm that generate adversarial examples according to the gradient☆11May 9, 2020Updated 5 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- This is Unitree Go2 simulation in NVIDIA IsaacLab/Isaac-Sim using ROS2 for Navigation and other tasks☆21Nov 26, 2025Updated 3 months ago
- DeepSAVA: Sparse Adversarial Video Attacks with Spatial Transformations - BMVC 2021 & Neural Networks (2023)☆11Dec 13, 2024Updated last year
- 图片或视频超分,提升画质☆12Jul 14, 2023Updated 2 years ago
- Code for ICLR'2021 paper: On Dyadic Fairness: Exploring and Mitigating Bias in Graph Connections☆12Jul 17, 2021Updated 4 years ago
- ☆10Jan 7, 2022Updated 4 years ago
- ☆14Dec 13, 2021Updated 4 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆43Oct 24, 2021Updated 4 years ago
- Symmetric Partial Homomorphic Encryption☆15Oct 13, 2020Updated 5 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆52Jul 6, 2022Updated 3 years ago
- ☆11Jan 4, 2022Updated 4 years ago
- ☆14Jul 26, 2020Updated 5 years ago
- Experimenting with DeepFake on videos - transferring gestures and voice of one person's video to another's☆13Apr 16, 2020Updated 5 years ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- A ros package to control unitree a1 along side with unitree_ros package utilizing a pytorch model trained in isaac-gym☆12Jul 16, 2023Updated 2 years ago
- ☆12Sep 14, 2020Updated 5 years ago
- Inception-I3D, Non Local finetune, hmdb51_flow☆15Oct 15, 2019Updated 6 years ago
- an implementation of CryptoNets☆11Aug 22, 2018Updated 7 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 8 years ago
- Machine Learning Xgboost☆16Mar 31, 2020Updated 5 years ago
- ☆18Feb 15, 2023Updated 3 years ago
- Large-Scale Sequence Mining with Hierarchies☆13Mar 13, 2015Updated 10 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- ☆16Aug 14, 2022Updated 3 years ago
- self ensemble label correction☆17Jul 29, 2022Updated 3 years ago
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- [Preprint] "Can 3D Adversarial Logos Cloak Humans?"☆18Dec 30, 2021Updated 4 years ago