git-disl / TOG
Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While DNN-powered object detection systems celebrate many life-enriching opportunities, they also open doors for misuse and abuse. This project presents a suite of adversarial objectness gradient attacks, coined as TO…
☆133Updated last year
Alternatives and similar repositories for TOG:
Users that are interested in TOG are comparing it to the libraries listed below
- A paper list for localized adversarial patch research☆144Updated last year
- https://arxiv.org/pdf/1906.11897.pdf☆20Updated 3 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆23Updated 2 years ago
- Adversarial Texture for Fooling Person Detectors in the Physical World☆58Updated 3 months ago
- A Paperlist of Adversarial Attack on Object Detection☆117Updated last year
- ☆55Updated 2 years ago
- ICCV 2021☆14Updated 3 years ago
- An adversarial attack on object detectors☆144Updated 3 years ago
- ☆29Updated 2 years ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆49Updated 3 years ago
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆23Updated last year
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆97Updated 3 months ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆46Updated 2 years ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆28Updated last year
- ☆16Updated 4 years ago
- Official implementation of Segmentation and Complete (SAC) defense.☆20Updated last year
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆90Updated 5 years ago
- PyTorch implementation of Expectation over Transformation☆12Updated 2 years ago
- Code repository for Ensemble-based Blackbox Attacks on Dense Prediction (EBAD), CVPR 2023☆21Updated 8 months ago
- ☆22Updated 2 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51Updated 3 years ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Updated 3 years ago
- Revisiting Transferable Adversarial Images (arXiv)☆118Updated 3 months ago
- Implementation of AAAI 2022 Paper: Context-Aware Transfer Attacks for Object Detection☆17Updated 2 years ago
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆25Updated last year
- ICCV 2021☆12Updated 3 years ago
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆87Updated last month
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆43Updated 3 years ago
- ☆39Updated 4 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆50Updated 2 years ago