WindVChen / Solution-For-AISafety-CVPR2022Links
A Simple and Effective Solution For AISafety CVPR2022, ranked 5th
☆12Updated 2 years ago
Alternatives and similar repositories for Solution-For-AISafety-CVPR2022
Users that are interested in Solution-For-AISafety-CVPR2022 are comparing it to the libraries listed below
Sorting:
- Official implementation of Segmentation and Complete (SAC) defense.☆24Updated 2 years ago
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆10Updated 9 months ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆241Updated last year
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆52Updated 4 years ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆41Updated 2 years ago
- A curated list of image manipulation detection and localization and related resources.☆118Updated 3 weeks ago
- AdvT-shirt-1K A Physical-world Adversarial T-shirt Dataset for Adversarial Robustness Evaluation☆12Updated 3 months ago
- Awesome-Adversarial-Attack-Methods-Summary☆12Updated last year
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆113Updated last year
- 2022阿里天池真实场景篡改图像检测挑战赛-冠军方案(1/1149)☆196Updated 3 years ago
- Available datasets for training and testing the method about Image Forgery Detection and Localization☆98Updated 8 months ago
- A notebook for recording my research.☆19Updated last year
- AutoSplice: A Text-prompt Manipulated Image Dataset for Media Forensics, WMF@CVPR2023☆47Updated 9 months ago
- ☆32Updated last year
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Updated last year
- A general image manipulation detection model.☆26Updated 5 years ago
- Feature Separation and Recalibration (CVPR 2023 Highlights)☆34Updated last year
- A Survey of Physical Adversarial Attack in Computer Vision☆29Updated last year
- C2P-CLIP-DeepfakeDetection☆74Updated 8 months ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Updated 2 years ago
- Corrections of resolution issue for common image manipulation localization datasets. (CASIA, Coverage, IMD2020)☆35Updated last year
- ☆78Updated last year
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆45Updated last year
- ☆29Updated last year
- ☆17Updated 3 years ago
- Unofficial implementation of ECCV20 paper "Thinking in frequency: Face forgery detection by mining frequency-aware clues"☆63Updated 3 years ago
- The repo is a source code for the project on Adversarial examples on Semantic Segmentation Networks☆13Updated 4 years ago
- ☆20Updated 11 months ago
- A list of awesome papers on AI-generated Image Detection.☆73Updated 3 weeks ago
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆19Updated last year