WindVChen / Solution-For-AISafety-CVPR2022Links
A Simple and Effective Solution For AISafety CVPR2022, ranked 5th
☆12Updated 2 years ago
Alternatives and similar repositories for Solution-For-AISafety-CVPR2022
Users that are interested in Solution-For-AISafety-CVPR2022 are comparing it to the libraries listed below
Sorting:
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆11Updated 8 months ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆234Updated last year
- Official implementation of Segmentation and Complete (SAC) defense.☆24Updated last year
- ☆26Updated last year
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆51Updated 4 years ago
- AdvT-shirt-1K A Physical-world Adversarial T-shirt Dataset for Adversarial Robustness Evaluation☆10Updated 2 months ago
- A curated list of image manipulation detection and localization and related resources.☆111Updated 2 months ago
- A notebook for recording my research.☆18Updated 11 months ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆112Updated last year
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆21Updated 2 years ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆39Updated 2 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆43Updated last year
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Updated last year
- Feature Separation and Recalibration (CVPR 2023 Highlights)☆34Updated last year
- The repo is a source code for the project on Adversarial examples on Semantic Segmentation Networks☆13Updated 4 years ago
- Official codes for FPR (Accepted by CVPR2025)☆11Updated 7 months ago
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆18Updated last year
- 2022阿里天池真实场景篡改图像检测挑战赛-冠军方案(1/1149)☆196Updated 2 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆111Updated 3 years ago
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆28Updated 10 months ago
- ☆78Updated last year
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆28Updated 3 months ago
- ☆37Updated last year
- [AAAI 2025] Official repository of paper “Mesoscopic Insights: Orchestrating Multi-scale & Hybrid Architecture for Image Manipulation Loc…☆65Updated 5 months ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆23Updated last year
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆64Updated last month
- The Code of ECCV2022:Enhanced Accuracy and Robustness via Multi-Teacher Adversarial Distillation☆35Updated 5 months ago
- Cross-Modal Transferable Adversarial Attacks from Images to Videos (CVPR 2022)☆20Updated last year
- Available datasets for training and testing the method about Image Forgery Detection and Localization☆91Updated 8 months ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Updated 2 years ago