ayberkydn / stadv-torchView external linksLinks
PyTorch implementation of Spatially Transformed Adversarial Examples
☆22Sep 18, 2023Updated 2 years ago
Alternatives and similar repositories for stadv-torch
Users that are interested in stadv-torch are comparing it to the libraries listed below
Sorting:
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- DeepSAVA: Sparse Adversarial Video Attacks with Spatial Transformations - BMVC 2021 & Neural Networks (2023)☆11Dec 13, 2024Updated last year
- 🏠🔍 Auto check for new apartments in Hamburg from various real estate provides☆16Jun 2, 2024Updated last year
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- Spatially Transformed Adversarial Examples with TensorFlow☆75Nov 3, 2018Updated 7 years ago
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆23Feb 10, 2025Updated last year
- ☆26Feb 14, 2024Updated last year
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Aug 17, 2023Updated 2 years ago
- Repository related to Cranfield's AAI MSCs GDP☆11Apr 8, 2023Updated 2 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- A Framework for Evaluating AI Agent Safety in Realistic Environments☆30Oct 2, 2025Updated 4 months ago
- ☆34Sep 6, 2025Updated 5 months ago
- Code and pretrained models accompanying the paper "Ensembling geophysical models using Bayesian Neural Networks"☆10Jul 11, 2022Updated 3 years ago
- ☆10Updated this week
- The MATLAB source for the DTCWT toolbox (1,2,3)D and keypoints.☆11Feb 10, 2014Updated 12 years ago
- A simple wrapper for python-bioformats to convert .vsi CellSense format to TIFF.☆12Apr 9, 2022Updated 3 years ago
- Data Programming for Text Detection in Documents using SPEAR☆12Mar 26, 2025Updated 10 months ago
- ☆10Nov 15, 2023Updated 2 years ago
- ☆12Jun 26, 2024Updated last year
- Convert datasets from Hugging Face to FiftyOne for Visualization☆11Mar 15, 2024Updated last year
- ☆10Oct 4, 2023Updated 2 years ago
- ☆10Apr 17, 2024Updated last year
- ☆10Aug 24, 2023Updated 2 years ago
- An implementation of the AlphaZero algorithm for adversarial games to be used with the machine learning framework of your choice☆12Aug 30, 2020Updated 5 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ☆10Nov 21, 2023Updated 2 years ago
- J. Solomon, G. Peyré, V. Kim, S. Sra. Entropic Metric Alignment for Correspondence Problems. ACM Transactions on Graphics (Proc. SIGGRAPH…☆10Jan 7, 2017Updated 9 years ago
- ☆12Jan 20, 2023Updated 3 years ago
- ☆20Feb 3, 2025Updated last year
- [ICCV2023] DR-Tune: Improving Fine-tuning of Pretrained Visual Models by Distribution Regularization with Semantic Calibration☆12Oct 12, 2023Updated 2 years ago
- Prompt Generator model for Stable Diffusion Models☆11Jun 20, 2023Updated 2 years ago
- Chainer and PyTorch implementation of GAN with gradient reversal layer☆10Mar 19, 2022Updated 3 years ago
- ☆10Dec 18, 2024Updated last year
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Framework to run the Federated Test-Time-Adaptation method StarAlign☆10May 17, 2024Updated last year
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆13Dec 16, 2024Updated last year
- A simple and efficient baseline for data attribution☆11Nov 10, 2023Updated 2 years ago
- ☆16Mar 17, 2025Updated 10 months ago