Adversarial Attack on Visual Object Tracking
☆16May 13, 2021Updated 5 years ago
Alternatives and similar repositories for attackTrack
Users that are interested in attackTrack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- We propose the adversarial blur attack (ABA) against visual object tracking.☆16Nov 18, 2021Updated 4 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆21Nov 25, 2020Updated 5 years ago
- [CVPR2021] IoU Attack: Towards Temporally Coherent Black-Box Adversarial Attack for Visual Object Tracking☆54Jun 25, 2021Updated 4 years ago
- [ECCV2020] Robust Tracking against Adversarial Attacks☆17Sep 9, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Bachelor Degree Project using GAN to Generate Synthetic Aperture Radar Images☆15Oct 5, 2024Updated last year
- Official implementation of CVPR2020 Paper "Cooling-Shrinking Attack"☆65Jun 22, 2022Updated 3 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆36Sep 19, 2020Updated 5 years ago
- Reproduces BPDA attack in pytorch☆13Oct 10, 2019Updated 6 years ago
- Generative label fused network for image–text matching☆10Jan 13, 2023Updated 3 years ago
- Anonymized code for Igeood: An Information Geometry Approach to Out-of-Distribution Detection☆12Jan 25, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆18Nov 3, 2022Updated 3 years ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- Implementation of CoralStyleCLIP: Co-optimized Region and Layer Selection for Image Editing☆18Mar 29, 2023Updated 3 years ago
- [RA-L 2020] Official Tensorflow Implementation for "RGGNet: Tolerance Aware LiDAR-Camera Online Calibration with Geometric Deep Learning …☆61Jul 29, 2024Updated last year
- Code for "Adversarial Defense by Stratified Convolutional Sparse Coding"☆19Jul 27, 2019Updated 6 years ago
- ☆20Jul 30, 2024Updated last year
- ☆17Jul 15, 2022Updated 3 years ago
- Official Implementation of CLIP-Guided StyleGAN Inversion for Text-Driven Real Image Editing published in ACM TOG 2023☆18Feb 29, 2024Updated 2 years ago
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆19Jul 5, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- Image-to-Image Translation in PyTorch☆27Jan 23, 2020Updated 6 years ago
- ☆21May 24, 2018Updated 7 years ago
- A Leaderboard for Certifiable Robustness against Adversarial Patch Attacks☆20Oct 30, 2023Updated 2 years ago
- Original PyTorch implementation of the AdversarialMask paper☆23Apr 16, 2023Updated 3 years ago
- Face Super-resolution Using Stochastic Differential Equations☆19Mar 17, 2023Updated 3 years ago
- ☆29Oct 22, 2020Updated 5 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Dec 25, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Real-time semantic segmentation inference production ready code based on deeplab-resnet/psp-net and tensorflow☆11May 18, 2018Updated 8 years ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22May 13, 2022Updated 4 years ago
- Building blocks of tensorflow architectures☆11Oct 14, 2019Updated 6 years ago
- VoxelNet Implementation for Usage on Win and Linux Systems☆10Jul 9, 2019Updated 6 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- Distributed pub-sub☆78Jan 25, 2022Updated 4 years ago
- A repository to caculate the just noticable difference of an image by Python☆29Mar 25, 2021Updated 5 years ago