Code for "ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking"
☆14Jul 13, 2022Updated 3 years ago
Alternatives and similar repositories for ObjectSeeker
Users that are interested in ObjectSeeker are comparing it to the libraries listed below
Sorting:
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- object detection, adversarial robustness, ICIP2021☆17Jan 10, 2021Updated 5 years ago
- (ICME2021) RPATTACK: REFINED PATCH ATTACK ON GENERAL OBJECT DETECTORS☆46Feb 14, 2022Updated 4 years ago
- Official implementation of Segmentation and Complete (SAC) defense.☆26Nov 13, 2023Updated 2 years ago
- Code for paper "PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking"☆73Jul 13, 2022Updated 3 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu …☆33Mar 16, 2022Updated 3 years ago
- Grid Patch Attack for Object Detection☆43Mar 31, 2022Updated 3 years ago
- Reimplementation the paper of Recurrent Convolutional Network for Video-based Person Re-Identification in Pytorch☆10Apr 9, 2019Updated 6 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- ☆13Jan 12, 2018Updated 8 years ago
- Sketch Based Image Retrieval☆10Jul 13, 2018Updated 7 years ago
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆15Nov 9, 2025Updated 3 months ago
- ☆13Apr 29, 2025Updated 10 months ago
- ☆20Sep 23, 2025Updated 5 months ago
- Agent-OM: Leveraging LLM Agents for Ontology Matching☆18Jan 24, 2026Updated last month
- This is official code for ASFL.☆21Mar 3, 2025Updated last year
- ☆11Nov 18, 2024Updated last year
- Official codes for FPR (Accepted by CVPR2025)☆13Mar 19, 2025Updated 11 months ago
- Unofficial implementation for the paper 'Improving Diffusion Models for Inverse Problems using Manifold Constraints'[https://arxiv.org/ab…☆12Aug 21, 2022Updated 3 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- Pytorch implementation of the Attentive Spatial-Temporal Pooling Networks by Shuangjie Xu(2017.https://arxiv.org/abs/1708.02286)☆12Jun 10, 2018Updated 7 years ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆57Oct 25, 2022Updated 3 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- Incremental Object Detection with Feature Pyramid Network(FPN) and Knowledge Distillation.☆13Jan 16, 2025Updated last year
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- Data sets and programs to generate data sets that can be used to evaluate resource allocation algorithms in clouds☆13Feb 8, 2017Updated 9 years ago
- Generate adversarial patches against YOLOv5 🚀☆68Oct 25, 2025Updated 4 months ago
- DEAL: Data-Efficient Adversarial Learning for High-Quality Infrared Imaging (CVPR 25)☆19Aug 20, 2025Updated 6 months ago
- Few training heuristics and small architectural changes that can significantly improve YOLOv3 performance with tiny increase in inference…☆12May 10, 2020Updated 5 years ago
- An Empirical Study of Federated Unlearning: Efficiency and Effectiveness (Accepted Conference Track Papers at ACML 2023)☆18Sep 29, 2023Updated 2 years ago
- 🦠 See COVID-19 cases and charts for your postcode or council area in 🇦🇺 NSW, Australia. Additionally, you can find close/casual contac…☆16Oct 27, 2025Updated 4 months ago
- 🍁 MapleStory Game Assistance Web Service 🍄☆17Jan 21, 2026Updated last month
- A Keras implementation of YOLOv3 (Tensorflow backend)☆11Mar 22, 2019Updated 6 years ago
- Course material for Purdue ECE57000 Artificial Intelligence☆16Nov 8, 2018Updated 7 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- ☆15Feb 15, 2018Updated 8 years ago
- verifying machine unlearning by backdooring☆20Mar 25, 2023Updated 2 years ago
- ICCV 2021☆14Oct 6, 2021Updated 4 years ago
- ☆18Sep 24, 2020Updated 5 years ago