Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)
☆34Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for Advlight
Users that are interested in Advlight are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆94Mar 24, 2023Updated 3 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆79Jan 13, 2022Updated 4 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆64Sep 16, 2025Updated 7 months ago
- ☆31Jun 22, 2021Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A very limited implementation of arXiv:1904.00759☆13Dec 2, 2019Updated 6 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- ☆23Sep 1, 2020Updated 5 years ago
- 💍☆26Feb 3, 2025Updated last year
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆100Jun 30, 2025Updated 10 months ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- ☆33Sep 9, 2020Updated 5 years ago
- ☆35May 29, 2024Updated last year
- ☆25Oct 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Apr 22, 2022Updated 4 years ago
- ☆30Nov 19, 2025Updated 5 months ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Jun 7, 2021Updated 4 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 6 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆40Aug 30, 2020Updated 5 years ago
- ☆53Jun 27, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆25Nov 12, 2022Updated 3 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- ICM-Assistant: Instruction-tuning Multimodal Large Language Models for Rule-based Explainable Image Content Moderation. AAAI, 2025☆14Aug 25, 2025Updated 8 months ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- The proliferation of fake news on social media sites is a serious problem with documented negative impacts on individuals and organizatio…☆13Oct 24, 2020Updated 5 years ago
- [CVPR 2023] Understanding the Robustness of 3D Object Detection With Bird's-Eye-View Representations in Autonomous Driving☆32Apr 3, 2024Updated 2 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆72Jun 21, 2018Updated 7 years ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆58Updated this week
- ☆12Sep 22, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Dec 5, 2020Updated 5 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆338Feb 18, 2021Updated 5 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- Release code for light-weight calibrator: a separable component for unsupervised domain adaptation☆13Jul 17, 2021Updated 4 years ago
- PyTorch implementation of adversarial patch☆215Mar 9, 2022Updated 4 years ago
- ☆29Jun 27, 2022Updated 3 years ago
- ☆63Aug 31, 2021Updated 4 years ago