WindVChen / Solution-For-AISafety-CVPR2022Links
A Simple and Effective Solution For AISafety CVPR2022, ranked 5th
☆11Updated last year
Alternatives and similar repositories for Solution-For-AISafety-CVPR2022
Users that are interested in Solution-For-AISafety-CVPR2022 are comparing it to the libraries listed below
Sorting:
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆11Updated 4 months ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆214Updated 7 months ago
- ☆23Updated 8 months ago
- Official implementation of Segmentation and Complete (SAC) defense.☆21Updated last year
- Feature Separation and Recalibration (CVPR 2023 Highlights)☆33Updated last year
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆50Updated 4 years ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆17Updated 2 years ago
- ☆73Updated 10 months ago
- The official PyTorch implementation of "Adversarially-Aware Robust Object Detector"☆59Updated 2 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆30Updated last year
- Based on the mmdetection framework, compute various salience maps for object detection.☆78Updated 5 months ago
- The Code of ECCV2022:Enhanced Accuracy and Robustness via Multi-Teacher Adversarial Distillation☆33Updated 2 weeks ago
- [ICLR 2024 Oral] Less is More: Fewer Interpretable Region via Submodular Subset Selection☆77Updated 2 months ago
- [TGRS🔥] Towards Generic and Controllable Attacks Against Object Detection☆32Updated last year
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆15Updated 10 months ago
- A Survey of Physical Adversarial Attack in Computer Vision☆16Updated 10 months ago
- ☆30Updated last year
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆35Updated last year
- [AAAI 2025] Official repository of paper “Mesoscopic Insights: Orchestrating Multi-scale & Hybrid Architecture for Image Manipulation Loc…☆47Updated 3 weeks ago
- C2P-CLIP-DeepfakeDetection☆57Updated 2 months ago
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆26Updated last year
- Synthetic Image Detection☆63Updated 6 months ago
- ☆35Updated 11 months ago
- A curated list of image manipulation detection and localization and related resources.☆91Updated 2 months ago
- Awesome-Adversarial-Attack-Methods-Summary☆12Updated 10 months ago
- Corrections of resolution issue for common image manipulation localization datasets. (CASIA, Coverage, IMD2020)☆30Updated last year
- Official repository for the paper "Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach"…☆31Updated 4 years ago
- AutoSplice: A Text-prompt Manipulated Image Dataset for Media Forensics, WMF@CVPR2023☆45Updated 4 months ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆107Updated 7 months ago
- AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks☆14Updated 3 weeks ago