VDIGPKU / T-SEALinks
[CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection
☆116Updated last year
Alternatives and similar repositories for T-SEA
Users that are interested in T-SEA are comparing it to the libraries listed below
Sorting:
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆44Updated 2 years ago
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆97Updated 7 months ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆42Updated 2 years ago
- A Paperlist of Adversarial Attack on Object Detection☆125Updated 2 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Updated 2 years ago
- Adversarial Texture for Fooling Person Detectors in the Physical World☆61Updated last year
- ICCV 2021☆32Updated 4 years ago
- Code repository for Ensemble-based Blackbox Attacks on Dense Prediction (EBAD), CVPR 2023☆27Updated last year
- ☆36Updated last year
- ☆67Updated 3 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Updated 2 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆115Updated 3 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆34Updated 3 years ago
- ☆40Updated 3 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Updated last year
- Official Pytorch implementation for our AAAI 2023 paper HOTCOLD Block: Fooling Thermal Infrared Detectors with a Novel Wearable Design☆36Updated 4 months ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆51Updated 4 years ago
- Official implementation of Segmentation and Complete (SAC) defense.☆26Updated 2 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆256Updated 2 months ago
- A paper list for localized adversarial patch research☆160Updated 6 months ago
- PyTorch implementation of Expectation over Transformation☆13Updated 6 months ago
- A curated list of papers for the transferability of adversarial examples☆76Updated last year
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆32Updated 2 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆64Updated 4 months ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Updated 2 years ago
- ☆44Updated last year
- Implementation of AAAI 2022 Paper: Context-Aware Transfer Attacks for Object Detection☆20Updated 3 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆140Updated 5 months ago
- Code for the paper "PAD: Patch-Agnostic Defense against Adversarial Patch Attacks" (CVPR 2024)☆27Updated last year
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Updated 2 years ago