code for paper "Physical-World Optical Adversarial Attacks on 3D Face Recognition"
☆20Oct 19, 2023Updated 2 years ago
Alternatives and similar repositories for SLAttack
Users that are interested in SLAttack are comparing it to the libraries listed below
Sorting:
- ☆18Dec 5, 2025Updated 3 months ago
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆42Aug 6, 2024Updated last year
- We propose the adversarial blur attack (ABA) against visual object tracking.☆16Nov 18, 2021Updated 4 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 3 years ago
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆44Oct 9, 2024Updated last year
- [CVPR2021] IoU Attack: Towards Temporally Coherent Black-Box Adversarial Attack for Visual Object Tracking☆54Jun 25, 2021Updated 4 years ago
- ☆28May 28, 2023Updated 2 years ago
- ☆14Dec 18, 2024Updated last year
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆26Feb 13, 2023Updated 3 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- PyTorch implementation of Adversarial Patch☆15Jul 6, 2023Updated 2 years ago
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆26Aug 31, 2022Updated 3 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- ☆38Sep 14, 2024Updated last year
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆46Aug 12, 2023Updated 2 years ago
- ☆20Oct 5, 2023Updated 2 years ago
- Research on adversarial attacks and defenses for deep neural network 3D point cloud classifiers like PointNet and PointNet++.☆27May 22, 2020Updated 5 years ago
- ☆34May 11, 2025Updated 10 months ago
- Adversarial Attack on Visual Object Tracking☆15May 13, 2021Updated 4 years ago
- Forked for gitlab, https://gitlab.com/EAVISE/adversarial-yolo☆21May 15, 2019Updated 6 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- ☆16Jun 10, 2025Updated 9 months ago
- ☆48Apr 7, 2025Updated 11 months ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Dec 5, 2020Updated 5 years ago
- http://arxiv.org/abs/2403.17301☆53Jan 4, 2026Updated 2 months ago
- 《Android开发艺术探索》这本书的学习,按照书中的介绍一步一步做的代码编写和记录☆11Mar 18, 2016Updated 10 years ago
- ☆21Nov 25, 2020Updated 5 years ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆55Oct 14, 2024Updated last year
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- New distributional and shape attacks on neural networks that process 3D point cloud data.☆43Mar 24, 2023Updated 2 years ago
- Demo code for the paper: One Thing to Fool them All: Generating Interpretable, Universal, and Physically-Realizable Adversarial Features☆12Nov 30, 2023Updated 2 years ago
- ☆14Jun 11, 2025Updated 9 months ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- Code for ICCV2025 paper——IDEATOR: Jailbreaking and Benchmarking Large Vision-Language Models Using Themselves☆17Jul 11, 2025Updated 8 months ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago