A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system
☆18Jun 8, 2021Updated 4 years ago
Alternatives and similar repositories for adversarial
Users that are interested in adversarial are comparing it to the libraries listed below
Sorting:
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆43Oct 24, 2021Updated 4 years ago
- https://arxiv.org/pdf/1906.11897.pdf☆23Oct 27, 2021Updated 4 years ago
- ICCV 2021☆14Oct 6, 2021Updated 4 years ago
- object detection, adversarial robustness, ICIP2021☆17Jan 10, 2021Updated 5 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- Grid Patch Attack for Object Detection☆43Mar 31, 2022Updated 3 years ago
- ☆30Apr 17, 2024Updated last year
- ☆18Sep 24, 2020Updated 5 years ago
- Camouflage YOLO - (CAMOLO) trains adversarial patches to confuse the YOLO family of object detectors.☆12Oct 20, 2022Updated 3 years ago
- PyTorch implementation of adversarial patch☆215Mar 9, 2022Updated 3 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Apr 4, 2023Updated 2 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆33Mar 16, 2022Updated 3 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51May 9, 2025Updated 9 months ago
- 😎 A curated list of awesome real-world adversarial examples resources☆62Jul 29, 2020Updated 5 years ago
- An example code of implement of PGD and FGSM algorithm for adversarial attack☆12Mar 3, 2022Updated 4 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- Unofficial implementation of the paper 'Adversarial Training for Free'☆23May 8, 2019Updated 6 years ago
- Official Repository for the CVPR 2020 AdvML Workshop paper "Role of Spatial Context in Adversarial Robustness for Object Detection"☆36Jun 23, 2020Updated 5 years ago
- A paper list for localized adversarial patch research☆161Jul 28, 2025Updated 7 months ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Mar 4, 2023Updated 2 years ago
- ICCV 2021☆32Oct 6, 2021Updated 4 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆167Jan 13, 2020Updated 6 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆51Feb 27, 2021Updated 5 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- ☆32May 11, 2025Updated 9 months ago
- Framework for Adversarial Malware Evaluation.☆35Mar 31, 2025Updated 11 months ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆63Sep 16, 2025Updated 5 months ago
- ☆38Jul 13, 2020Updated 5 years ago
- ☆40Jan 7, 2023Updated 3 years ago
- ☆12Nov 12, 2024Updated last year
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆39Feb 14, 2026Updated 2 weeks ago
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- ☆35Dec 9, 2020Updated 5 years ago
- Convergent Dispersal Deduplication Datastore☆10Jan 21, 2016Updated 10 years ago