JHL-HUST / EMIView external linksLinks
Boosting Transferability through Enhanced Momentum
☆14Feb 23, 2024Updated last year
Alternatives and similar repositories for EMI
Users that are interested in EMI are comparing it to the libraries listed below
Sorting:
- ☆36Feb 23, 2024Updated last year
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated last year
- ☆16Sep 23, 2022Updated 3 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆17Jul 19, 2022Updated 3 years ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆22Feb 23, 2024Updated last year
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆167Apr 30, 2019Updated 6 years ago
- ☆71May 18, 2021Updated 4 years ago
- ☆37Jul 3, 2024Updated last year
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 10 months ago
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆12Jul 17, 2024Updated last year
- ☆14Aug 12, 2024Updated last year
- Official Repository for the CVPR 2020 AdvML Workshop paper "Role of Spatial Context in Adversarial Robustness for Object Detection"☆36Jun 23, 2020Updated 5 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆440Jan 16, 2026Updated 3 weeks ago
- ☆11Aug 31, 2023Updated 2 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- [ICML 2025 Oral] This is the official repository of the paper "What Limits Virtual Agent Application? OmniBench: A Scalable Multi-Dimensi…☆20Jun 12, 2025Updated 8 months ago
- Reimplementation the paper of Recurrent Convolutional Network for Video-based Person Re-Identification in Pytorch☆10Apr 9, 2019Updated 6 years ago
- DeepSAVA: Sparse Adversarial Video Attacks with Spatial Transformations - BMVC 2021 & Neural Networks (2023)☆11Dec 13, 2024Updated last year
- Official implementation of "FET-FGVC: Feature-Enhanced Transformer for Fine-Grained Visual Classification"☆15Dec 18, 2024Updated last year
- ☆14Dec 18, 2024Updated last year
- Sketch Based Image Retrieval☆10Jul 13, 2018Updated 7 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆13Feb 28, 2024Updated last year
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ☆19Jul 22, 2025Updated 6 months ago
- Code for "Live Trojan Attacks on Deep Neural Networks" paper☆10May 8, 2020Updated 5 years ago
- A library for multi-task learning and meta-learning.☆12Feb 7, 2022Updated 4 years ago
- Defending AI-Based Automatic Modulation Recognition Models Against Adversarial Attacks☆12Jan 11, 2025Updated last year
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated last year
- Take Your Model Further: A General Post-refinement Network for Light Field Disparity Estimation via BadPix Correction☆10Feb 28, 2023Updated 2 years ago
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Mar 17, 2021Updated 4 years ago
- Using VAEs to do clustering for classification☆11Nov 5, 2017Updated 8 years ago
- ☆14Dec 31, 2024Updated last year
- Incremental Object Detection with Feature Pyramid Network(FPN) and Knowledge Distillation.☆12Jan 16, 2025Updated last year