The code of "Adversarial Metric Attack for Person Re-identification"
☆30Feb 8, 2019Updated 7 years ago
Alternatives and similar repositories for Adversarial_Metric_Attack
Users that are interested in Adversarial_Metric_Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metric Adversarial Attacks and Defense☆19Sep 28, 2021Updated 4 years ago
- This is a pytorch implementation of the CVPR2020 paper: Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-id…☆96Jun 4, 2021Updated 4 years ago
- A Person Re-identification Data Augmentation Method with Adversarial Defense Effect☆21Mar 30, 2024Updated 2 years ago
- Code for AAAI 2021 paper ``MetaAttack"☆26Jun 10, 2021Updated 4 years ago
- ☆10May 4, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Feb 25, 2019Updated 7 years ago
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆32Jun 9, 2020Updated 5 years ago
- [TMLR'24] This repository includes the official implementation our paper "Unleashing the Power of Visual Prompting At the Pixel Level"☆42Apr 30, 2024Updated 2 years ago
- ☆19Mar 27, 2018Updated 8 years ago
- ☆44May 8, 2020Updated 6 years ago
- Temporal Lifting (TLift), a model-free temporal cooccurrence based score weighting method proposed in "Interpretable and Generalizable Pe…☆10Jul 24, 2020Updated 5 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for AutoNL on ImageNet (CVPR2020)☆104May 16, 2020Updated 5 years ago
- Smooth Adversarial Training☆68Nov 16, 2020Updated 5 years ago
- Deep neural network model introducing new novel matching layer called 'Normalized correlation' layer. This repository contains informatio…☆21Jul 10, 2019Updated 6 years ago
- PatchAttack (ECCV 2020)☆65May 22, 2020Updated 5 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Mar 28, 2026Updated last month
- Adversarial Robustness, White-box, Adversarial Attack☆50Jul 6, 2022Updated 3 years ago
- Improve Person Re-Identification With Part Awareness Learning, TIP 2020☆18Aug 31, 2020Updated 5 years ago
- The official code for ECCV2020 "Rethinking the Distribution Gap of Person Re-identification with Camera-based Batch Normalization"☆104Jul 25, 2024Updated last year
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Jun 15, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆140Aug 23, 2023Updated 2 years ago
- This repository includes the official project of L2B, from our paper "Learning to Bootstrap for Combating Label Noise".☆33Mar 16, 2025Updated last year
- Automatic Recall Machines: Internal Replay, Continual Learning and the Brain☆11Jul 14, 2020Updated 5 years ago
- Code for LDLForests☆20Oct 4, 2018Updated 7 years ago
- Dataset for AAAI paper "Natural Language Inference in Context - Investigating Contextual Reasoning over Long Texts"☆11Nov 18, 2022Updated 3 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 7 years ago
- Code and models for the paper Shape-Texture Debiased Neural Network Training (ICLR 2021)☆111Aug 4, 2023Updated 2 years ago
- IJCV22 Attack your retrieval model via Query! They are not robust as you expected!☆48Nov 30, 2022Updated 3 years ago
- Mancs: A multi-task attentional network with curriculum sampling for person re-identification☆13Aug 5, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PRCV2020大规模行人检索竞赛(LSPRC)☆18Jul 1, 2020Updated 5 years ago
- ☆12Aug 7, 2019Updated 6 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- KL-loss☆10Oct 14, 2019Updated 6 years ago
- ☆14Jul 2, 2024Updated last year
- Simple Text Classification[WIP]☆11Dec 30, 2022Updated 3 years ago
- The matlab code of Sparse Contextual Activation (SCA) published in TIP 2016☆10Mar 18, 2018Updated 8 years ago