Sizhe-Chen / RAD
Relevance attack on detectors
☆9Updated 2 years ago
Alternatives and similar repositories for RAD:
Users that are interested in RAD are comparing it to the libraries listed below
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆20Updated 3 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆82Updated 2 years ago
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆26Updated last year
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆22Updated 2 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Updated 2 years ago
- Pytorch implementation of Adversarial Patch on ImageNet (arXiv: https://arxiv.org/abs/1712.09665)☆61Updated 5 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆25Updated 2 years ago
- ☆70Updated 3 years ago
- ☆35Updated last year
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆21Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆33Updated 2 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆86Updated last year
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆27Updated 3 years ago
- Is RobustBench/AutoAttack a suitable Benchmark for Adversarial Robustness?☆11Updated 2 years ago
- PyTorch implementation of Adversarial Patch☆13Updated last year
- An unofficial implementation of the paper《Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective》☆22Updated 2 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆102Updated 2 years ago
- ICCV 2021☆13Updated 3 years ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆60Updated 2 years ago
- ☆57Updated 2 years ago