Code for our CVPR 2018 paper, "On the Robustness of Semantic Segmentation Models to Adversarial Attacks"
☆103Mar 8, 2019Updated 7 years ago
Alternatives and similar repositories for adversarial-attacks
Users that are interested in adversarial-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- The repo is a source code for the project on Adversarial examples on Semantic Segmentation Networks☆13Sep 12, 2021Updated 4 years ago
- ☆12Mar 29, 2021Updated 5 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆72Jun 21, 2018Updated 7 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆127Jan 30, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆28Sep 22, 2022Updated 3 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- Pre-trained model, code, and materials from the paper "Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmen…☆60Jul 6, 2020Updated 5 years ago
- Attacking Optical Flow (ICCV 2019)☆58Apr 28, 2020Updated 6 years ago
- Track hijacking attack against Multiple-Object Tracking☆45Aug 27, 2019Updated 6 years ago
- ☆14Jul 25, 2020Updated 5 years ago
- Pytorch implementation of convolutional neural network adversarial attack techniques☆365Dec 3, 2018Updated 7 years ago
- Codes for reproducing the white-box adversarial attacks in “EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples,” …☆21Sep 22, 2018Updated 7 years ago
- NIPS 2017 Adversarial Competition in PyTorch☆15Feb 4, 2018Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- Implementation of Papers on Adversarial Examples☆396Apr 24, 2023Updated 3 years ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Aug 8, 2023Updated 2 years ago
- ☆11Dec 6, 2020Updated 5 years ago
- Nuerapse simulations for SNNs☆25Oct 10, 2018Updated 7 years ago
- ☆24Apr 14, 2019Updated 7 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- When can you tell whether an image has been cropped or not?☆29Sep 19, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ImageNet classifier with state-of-the-art adversarial robustness☆684Dec 31, 2019Updated 6 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 8 years ago
- End-to-End Adversarial Erasing for Weakly Supervised Semantic Segmentation☆15Nov 15, 2020Updated 5 years ago
- Pytorch implementation of "Hallucinating Agnostic Images to Generalize Across Domains"☆11Jul 10, 2019Updated 6 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆168Jan 13, 2020Updated 6 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆132Apr 4, 2023Updated 3 years ago
- Supplementary material to "Top-down Visual Saliency Guided by Captions" (CVPR 2017)☆107Jan 22, 2018Updated 8 years ago
- Knowledge Distillation with Adversarial Samples Supporting Decision Boundary (AAAI 2019)☆71Sep 9, 2019Updated 6 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆136May 29, 2018Updated 7 years ago
- Code for "Boosting Semi-supervised Image Segmentation with Global and Local Mutual Information Regularization"☆13Jul 14, 2021Updated 4 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆763May 3, 2022Updated 4 years ago
- Automated Simulations of Adversarial Attacks on Arbitrary Objects in Realistic Scenes☆14Oct 5, 2025Updated 6 months ago
- Detail-Preserving Pooling in Deep Networks (CVPR 2018)☆118Nov 14, 2018Updated 7 years ago
- A Toolbox for Adversarial Robustness Research☆1,367Sep 14, 2023Updated 2 years ago
- ☆36Aug 30, 2019Updated 6 years ago