Jack-lx-jiang / VBADView external linksLinks
Black-box Adversarial Attacks on Video Recognition Models. (VBAD)
☆27Oct 28, 2019Updated 6 years ago
Alternatives and similar repositories for VBAD
Users that are interested in VBAD are comparing it to the libraries listed below
Sorting:
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- Code and videos accompanying the paper "Flickering Adversarial Attacks against Video Recognition Networks"☆16Dec 8, 2022Updated 3 years ago
- [CVPR2020] Clean-Label Backdoor Attacks on Video Recognition Models☆41Jun 19, 2020Updated 5 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- Code for our ECCV 2018 paper "Affine Correspondences between Central Cameras for Rapid Relative Pose Estimation"☆14Dec 15, 2018Updated 7 years ago
- [Machine Learning 2023] Imbalanced Gradients: A Subtle Cause of Overestimated Adversarial Robustness☆17Jul 5, 2024Updated last year
- ☆16Jul 25, 2022Updated 3 years ago
- ☆19May 2, 2020Updated 5 years ago
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆45Aug 29, 2021Updated 4 years ago
- Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks☆46Feb 24, 2022Updated 3 years ago
- Cross-Modal Transferable Adversarial Attacks from Images to Videos (CVPR 2022)☆20Jul 3, 2024Updated last year
- This is the official code for the paper "Ad2Attack: Adaptive Adversarial Attack for Real-Time UAV Tracking".☆27Sep 25, 2021Updated 4 years ago
- ☆20Mar 14, 2018Updated 7 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆49Oct 3, 2023Updated 2 years ago
- Action localization Proposals from dense Trajectories☆21Jan 14, 2016Updated 10 years ago
- Official PyTorch implementation of "Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian O…☆25Sep 26, 2023Updated 2 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- Code for the ICCV 2021 paper "Augmented Lagrangian Adversarial Attacks"☆24Mar 28, 2024Updated last year
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated last year
- ☆67Jun 2, 2022Updated 3 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- PatchAttack (ECCV 2020)☆64May 22, 2020Updated 5 years ago
- A curated list of papers for the transferability of adversarial examples☆76Jul 8, 2024Updated last year
- ☆23Jan 10, 2019Updated 7 years ago
- Smooth Adversarial Training☆68Nov 16, 2020Updated 5 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆34Dec 16, 2019Updated 6 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Dec 26, 2019Updated 6 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- 新词发现/新词挖掘/自由度/凝固度/python3☆10May 28, 2019Updated 6 years ago
- Finetuning & extending DiffusionDet to video & pedestrian multi-object-tracking☆13Apr 12, 2023Updated 2 years ago
- Style Transfer by Rigid Alignment in Neural Net Feature Space☆11Jan 23, 2021Updated 5 years ago
- ☆37Jul 3, 2024Updated last year
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆35Mar 8, 2021Updated 4 years ago
- ☆10Oct 13, 2024Updated last year
- Detects scene change or cuts in a video file☆11Oct 23, 2017Updated 8 years ago
- ☆11Apr 6, 2019Updated 6 years ago
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 10 months ago
- ☆10May 18, 2024Updated last year
- I have created a dataset of Image-Text-Pairs by using the cosine similarity of the CLIP embeddings of the image & it's caption derrived f…☆15Apr 22, 2021Updated 4 years ago