dinglijay / attackTrackLinks
Adversarial Attack on Visual Object Tracking
☆15Updated 4 years ago
Alternatives and similar repositories for attackTrack
Users that are interested in attackTrack are comparing it to the libraries listed below
Sorting:
- ☆38Updated 5 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Updated 3 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Updated 4 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88Updated 6 years ago
- ☆43Updated 5 years ago
- ☆23Updated 5 years ago
- An adversarial robustness evaluation library on face recognition.☆114Updated 2 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Updated 3 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆64Updated 4 months ago
- ☆67Updated 3 years ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Updated 3 years ago
- ☆32Updated 8 months ago
- An adversarial attack on object detectors☆148Updated 4 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Updated 3 years ago
- ☆14Updated 5 years ago
- (ICME2021) RPATTACK: REFINED PATCH ATTACK ON GENERAL OBJECT DETECTORS☆47Updated 3 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Updated 3 years ago
- ☆41Updated 3 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆37Updated 5 years ago
- ☆16Updated 3 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 5 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆73Updated 7 years ago
- ICCV 2021☆32Updated 4 years ago
- ☆44Updated 5 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆94Updated 2 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Updated 2 years ago
- ☆62Updated 4 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Updated last year
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Updated 2 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆142Updated 2 years ago