Zhang-Jack / adversarial_yolo2View external linksLinks
Forked for gitlab, https://gitlab.com/EAVISE/adversarial-yolo
☆21May 15, 2019Updated 6 years ago
Alternatives and similar repositories for adversarial_yolo2
Users that are interested in adversarial_yolo2 are comparing it to the libraries listed below
Sorting:
- ICCV 2021☆14Oct 6, 2021Updated 4 years ago
- PyTorch implementation of Adversarial Patch☆15Jul 6, 2023Updated 2 years ago
- An adversarial attack on object detectors☆148Oct 12, 2021Updated 4 years ago
- https://arxiv.org/pdf/1906.11897.pdf☆23Oct 27, 2021Updated 4 years ago
- ☆44May 8, 2020Updated 5 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- [ECCV2020] Robust Tracking against Adversarial Attacks☆16Sep 9, 2021Updated 4 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- Adversarial attack to detectors☆46Oct 23, 2021Updated 4 years ago
- code for paper "Physical-World Optical Adversarial Attacks on 3D Face Recognition"☆20Oct 19, 2023Updated 2 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Apr 4, 2023Updated 2 years ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Aug 8, 2023Updated 2 years ago
- ☆23Jun 25, 2023Updated 2 years ago
- Generate adversarial patches against YOLOv5 🚀☆66Oct 25, 2025Updated 3 months ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆93Mar 24, 2023Updated 2 years ago
- Code for the paper "PAD: Patch-Agnostic Defense against Adversarial Patch Attacks" (CVPR 2024)☆28Apr 28, 2024Updated last year
- Adversarial Texture for Fooling Person Detectors in the Physical World☆61Oct 20, 2024Updated last year
- ☆28Sep 22, 2022Updated 3 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 3 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆34Sep 18, 2020Updated 5 years ago
- filswan community discussion and governance☆10Nov 15, 2023Updated 2 years ago
- It is the official code of the AAAI-24 paper "Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain"☆17Oct 11, 2025Updated 4 months ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated last year
- ☆28Feb 20, 2025Updated 11 months ago
- Experimenting and exploring Computer Vision with Deep Learning☆10Mar 29, 2025Updated 10 months ago
- 南开大学软件学院本科生课程资料分享☆28Nov 14, 2024Updated last year
- CelePixel CeleX5-MIPI C++ API Wrapper for Python 3☆11May 11, 2023Updated 2 years ago
- a simple torjan written with python ;python写的盗号木马;键盘监听 ;盗QQ号;☆12Jun 3, 2023Updated 2 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆13Feb 28, 2024Updated last year
- ☆12Sep 22, 2023Updated 2 years ago
- the codes are for the series CNN baselines tested in our wildfile flame detection dataset.☆10Nov 21, 2022Updated 3 years ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- ☆11Oct 27, 2019Updated 6 years ago
- [ECCV2024] "Just a Hint: Point-Supervised Camouflaged Object Detection"☆13Mar 21, 2025Updated 10 months ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- Software for FLIR thermal camera interfacing.☆10Sep 4, 2014Updated 11 years ago
- 基于Tensorflow卷积神经网络天气图像识别系统设计毕业源码案例设计☆14Apr 27, 2023Updated 2 years ago