Track hijacking attack against Multiple-Object Tracking
☆45Aug 27, 2019Updated 6 years ago
Alternatives and similar repositories for hijacking
Users that are interested in hijacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Mar 26, 2024Updated 2 years ago
- Grid Patch Attack for Object Detection☆43Mar 31, 2022Updated 4 years ago
- Official implementation of CVPR2020 Paper "Cooling-Shrinking Attack"☆65Jun 22, 2022Updated 3 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- ☆25Jun 9, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆21Nov 25, 2020Updated 5 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- ☆11Oct 13, 2024Updated last year
- https://arxiv.org/pdf/1906.11897.pdf☆23Oct 27, 2021Updated 4 years ago
- Code for our CVPR 2018 paper, "On the Robustness of Semantic Segmentation Models to Adversarial Attacks"☆103Mar 8, 2019Updated 7 years ago
- Deep Sensor Fusion for Single Source Robustness☆12Feb 5, 2026Updated 2 months ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Aug 4, 2021Updated 4 years ago
- Matlab side for our CVPR 2019 paper.☆15Apr 22, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The repo is a source code for the project on Adversarial examples on Semantic Segmentation Networks☆13Sep 12, 2021Updated 4 years ago
- ☆26Mar 24, 2023Updated 3 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆168Jan 13, 2020Updated 6 years ago
- ☆15Dec 4, 2019Updated 6 years ago
- An adversarial attack on object detectors☆147Oct 12, 2021Updated 4 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆132Apr 4, 2023Updated 3 years ago
- Combination of SiamRPN and VGG☆39Apr 7, 2019Updated 7 years ago
- Code for paper "PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking"☆74Jul 13, 2022Updated 3 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 5 years ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Aug 8, 2023Updated 2 years ago
- Code for CVPR24 Paper - Resource-Efficient Transformer Pruning for Finetuning of Large Models☆12Oct 31, 2025Updated 5 months ago
- ☆25Mar 12, 2022Updated 4 years ago
- ☆33Sep 23, 2022Updated 3 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- Learning Dynamic Siamese Network for Visual Object Tracking☆40Mar 3, 2018Updated 8 years ago
- ☆40Sep 12, 2025Updated 7 months ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Oct 20, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago
- MOTDT with Homography Matrix for Multi-Object Tracking☆20Nov 3, 2020Updated 5 years ago
- Learning the Model Update for Siamese Trackers (ICCV 2019)☆139Oct 24, 2019Updated 6 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- https://arxiv.org/abs/2106.12442☆10Jun 22, 2021Updated 4 years ago
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆65Nov 23, 2019Updated 6 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Dec 5, 2020Updated 5 years ago