SAGA: Spectral Adversarial Geometric Attack on 3D Meshes (ICCV 2023)
☆25Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for SAGA
Users that are interested in SAGA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Self-Supervised Correspondence and Optimization-Based Scene Flow (CVPR 2023)☆66Jun 25, 2023Updated 2 years ago
- ☆19Apr 27, 2022Updated 3 years ago
- Localizing Regions on 3D Shapes via Text Descriptions☆103Feb 9, 2025Updated last year
- Identity-preserving 3D geometric stylization via surface normal deformation☆40Oct 7, 2025Updated 5 months ago
- Geometric Adversarial Attacks and Defenses on 3D Point Clouds (3DV 2021)☆26Jun 25, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Official Code for Epsilon-Mesh Attack (IEEE FG 2024)☆17Nov 14, 2024Updated last year
- Code for our paper "Fixed-point Inversion for Text-to-image diffusion models"☆19Oct 13, 2024Updated last year
- ☆14Apr 18, 2022Updated 3 years ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- http://arxiv.org/abs/2403.17301☆53Jan 4, 2026Updated 2 months ago
- Interactive 3D Segmentation via Interactive Attention☆36Jul 6, 2025Updated 8 months ago
- ☆13Aug 26, 2024Updated last year
- The code for AAAI2023 (Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization)☆13Dec 24, 2022Updated 3 years ago
- ☆29Aug 9, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repo contains the python code as well as the webpage html files for the Spice-E project from VAILab at TAU.☆27Dec 9, 2024Updated last year
- ☆11Dec 15, 2024Updated last year
- Code for Geometry-Aware Generation of Adversarial Point Clouds☆35Jul 15, 2021Updated 4 years ago
- ☆14Dec 18, 2024Updated last year
- ☆38Sep 14, 2024Updated last year
- [SIGGRAPH 2024] "EASI-Tex: Edge-Aware Mesh Texturing from Single Image", ACM Transactions on Graphics.☆128Sep 18, 2025Updated 6 months ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- ☆14Mar 23, 2024Updated 2 years ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Official repository for "Boosting Adversarial Transferability using Dynamic Cues " (ICLR 2023)☆20Aug 24, 2023Updated 2 years ago
- The implementation of MeshSegmenter: Zero-Shot Mesh Semantic Segmentation via Texture Synthesis☆42Jul 15, 2024Updated last year
- Benchmarking general decision-making with open & random worlds☆20Updated this week
- This repo contains the python code as well as the webpage html files for the Vox-E project from VAILab at TAU.☆78Apr 20, 2025Updated 11 months ago
- LLMs for Wargames☆18Sep 21, 2024Updated last year
- Pytorch Implementation of DECOLLAGE (ECCV 2024)☆11Oct 21, 2024Updated last year
- [ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos☆12Mar 29, 2024Updated last year
- Semantic point cloud segmentation with graph convolutional network☆10Dec 10, 2017Updated 8 years ago
- 🤗 PEFT: State-of-the-art Parameter-Efficient Fine-Tuning.☆18Apr 11, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Official implementation for the paper: "Real-Time Inverse Kinematics for Generating Multi-Constrained Movements of Virtual Human Characte…☆18Feb 19, 2026Updated last month
- ☆154Apr 24, 2025Updated 11 months ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- Tools for running experiments on RL agents in procgen environments☆20Apr 5, 2024Updated last year
- Based on: https://arxiv.org/abs/2202.07453☆11Jan 15, 2023Updated 3 years ago
- Dynamic human body shape model☆11Aug 31, 2020Updated 5 years ago