☆43Jul 27, 2021Updated 4 years ago
Alternatives and similar repositories for OPPO_ADVERSARIAL_ATTACK
Users that are interested in OPPO_ADVERSARIAL_ATTACK are comparing it to the libraries listed below
Sorting:
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Oct 1, 2019Updated 6 years ago
- 简单的挖矿病毒查杀脚本☆19Apr 4, 2022Updated 3 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆59Jun 18, 2021Updated 4 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated 2 years ago
- Experiments on Data Poisoning Regression Learning☆12Oct 5, 2020Updated 5 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- source code for NeurIPS21 paper robabilistic Margins for Instance Reweighting in Adversarial Training☆11Apr 28, 2022Updated 3 years ago
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆416Jul 6, 2021Updated 4 years ago
- ☆16Nov 2, 2020Updated 5 years ago
- Code for modeling attention network for distant supervised relation extraction (CoNLL 2019).☆15Feb 28, 2020Updated 6 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- ☆17Feb 25, 2019Updated 7 years ago
- Adversarially Robust Transfer Learning with LWF loss applied to the deep feature representation (penultimate) layer☆19Feb 9, 2020Updated 6 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- ☆28Aug 13, 2025Updated 6 months ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- TIFS2022: Decision-based Adversarial Attack with Frequency Mixup☆22Aug 8, 2023Updated 2 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆337Feb 18, 2021Updated 5 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- Reproduce multiple adversarial attack methods☆21May 5, 2020Updated 5 years ago
- 对抗样本☆275Dec 8, 2022Updated 3 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 3 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Feb 25, 2019Updated 7 years ago
- Code and model for the AI City Challenge (CVPR 2022) Track 3 Action Detection (Naturalistic Driving Action Recognition)☆28Jul 22, 2023Updated 2 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Official code repository for the MICCAI 2025 paper "UltraRay: Introducing Full-Path Ray Tracing in Physics-Based Ultrasound Simulation"☆17Aug 13, 2025Updated 6 months ago
- Dataset created for the Power Line Insulators Inspection Detections☆10Jul 2, 2020Updated 5 years ago
- Implementation of the CVPR2025 paper LoTUS: Large-Scale Machine Unlearning with a Taste of Uncertainty.☆17Sep 10, 2025Updated 5 months ago
- A novel data-free model stealing method based on GAN☆133Oct 11, 2022Updated 3 years ago
- [ACM MM 2021] Diverse Image Inpainting with Bidirectional and Autoregressive Transformers☆33Oct 17, 2021Updated 4 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆134May 29, 2018Updated 7 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- This project is the official implementation of "Local and Global Logit Adjustments for Long-Tailed Learning", ICCV 2023☆12Feb 19, 2024Updated 2 years ago