Track hijacking attack against Multiple-Object Tracking
☆45Aug 27, 2019Updated 6 years ago
Alternatives and similar repositories for hijacking
Users that are interested in hijacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Mar 26, 2024Updated last year
- Official implementation of CVPR2020 Paper "Cooling-Shrinking Attack"☆65Jun 22, 2022Updated 3 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- ☆11Oct 13, 2024Updated last year
- Deep Sensor Fusion for Single Source Robustness☆12Feb 5, 2026Updated last month
- ☆26Dec 23, 2021Updated 4 years ago
- The repo is a source code for the project on Adversarial examples on Semantic Segmentation Networks☆13Sep 12, 2021Updated 4 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆168Jan 13, 2020Updated 6 years ago
- ☆16Dec 4, 2019Updated 6 years ago
- An adversarial attack on object detectors☆149Oct 12, 2021Updated 4 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Apr 4, 2023Updated 2 years ago
- Combination of SiamRPN and VGG☆39Apr 7, 2019Updated 6 years ago
- Official Repository for the CVPR 2020 AdvML Workshop paper "Role of Spatial Context in Adversarial Robustness for Object Detection"☆36Jun 23, 2020Updated 5 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 4 years ago
- ☆18Mar 24, 2023Updated 2 years ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Aug 8, 2023Updated 2 years ago
- ☆25Mar 12, 2022Updated 4 years ago
- ☆33Sep 23, 2022Updated 3 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- Learning Dynamic Siamese Network for Visual Object Tracking☆40Mar 3, 2018Updated 8 years ago
- Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inferen…☆15Nov 21, 2022Updated 3 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51May 9, 2025Updated 10 months ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Oct 20, 2021Updated 4 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- Source code for the paper: "A Latency-Predictable Multi-Dimensional Optimization Framework forDNN-driven Autonomous Systems"☆22Jan 4, 2021Updated 5 years ago
- ☆12Mar 29, 2021Updated 4 years ago
- ☆11Mar 24, 2023Updated 2 years ago
- Official Pytorch implementation of Continuous Object Representation Networks: Novel View Synthesis without 3D or Target View Supervision☆15Nov 8, 2020Updated 5 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆51Nov 2, 2020Updated 5 years ago
- ☆17Nov 15, 2021Updated 4 years ago
- Materials for ECS 201A☆11Oct 23, 2019Updated 6 years ago
- ☆44May 8, 2020Updated 5 years ago
- fhog features C++ code☆10Aug 20, 2018Updated 7 years ago
- ☆14Apr 25, 2025Updated 10 months ago
- ☆11Apr 5, 2020Updated 5 years ago