PyTorch implementation of Adversarial Patch
☆15Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for adv-patch
Users that are interested in adv-patch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Simulations of Adversarial Attacks on Arbitrary Objects in Realistic Scenes☆14Oct 5, 2025Updated 6 months ago
- ☆12Sep 22, 2023Updated 2 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- Forked for gitlab, https://gitlab.com/EAVISE/adversarial-yolo☆22May 15, 2019Updated 6 years ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆42Aug 13, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated 2 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago
- 😎 A curated list of awesome real-world adversarial examples resources☆63Jul 29, 2020Updated 5 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 8 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- ICCV 2021☆14Oct 6, 2021Updated 4 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- (ICME2021) RPATTACK: REFINED PATCH ATTACK ON GENERAL OBJECT DETECTORS☆45Feb 14, 2022Updated 4 years ago
- Public repo for transferability ICLR 2017 paper☆53Jan 3, 2019Updated 7 years ago
- code for paper "Physical-World Optical Adversarial Attacks on 3D Face Recognition"☆20Oct 19, 2023Updated 2 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆64Sep 16, 2025Updated 6 months ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- This repository provides the official PyTorch implementation of the paper: MaskFactory: Towards High-quality Synthetic Data Generation Fo…☆33Feb 18, 2025Updated last year
- Ada-LISTA: Learned Solvers Adaptive to Varying Models☆11Feb 18, 2020Updated 6 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆93Mar 24, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆91Apr 1, 2026Updated last week
- Hidden backdoor attack on NLP systems☆46Nov 14, 2021Updated 4 years ago
- ☆38Sep 14, 2024Updated last year
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- [ICCV 2025] FiVE-Bench: A Fine-grained Video Editing Benchmark for Evaluating Emerging Diffusion and Rectified Flow Models☆35Apr 2, 2026Updated last week
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆29Feb 1, 2022Updated 4 years ago
- ☆35Dec 9, 2020Updated 5 years ago
- ☆15Aug 26, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- ☆20Mar 14, 2022Updated 4 years ago
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Apr 22, 2020Updated 5 years ago
- Courbariaux, Matthieu, Yoshua Bengio, and Jean-Pierre David. "Binaryconnect: Training deep neural networks with binary weights during pro…☆12Aug 31, 2020Updated 5 years ago
- An adversarial robustness evaluation library on face recognition.☆113Jul 6, 2023Updated 2 years ago
- Localization of Knowledge in Text-to-Image Models☆12Oct 8, 2024Updated last year
- 算法工程师方法论-从数学基础到理论应用☆13Aug 9, 2019Updated 6 years ago