jiangyangzhou / Non-targeted-Attack-IJCAI2019-ColdRiverLinks
No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))
☆11Updated 5 years ago
Alternatives and similar repositories for Non-targeted-Attack-IJCAI2019-ColdRiver
Users that are interested in Non-targeted-Attack-IJCAI2019-ColdRiver are comparing it to the libraries listed below
Sorting:
- Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》☆30Updated 5 years ago
- This is a pytorch implementation of the CVPR2020 paper: Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-id…☆95Updated 4 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆126Updated 7 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Updated 6 years ago
- Code for "Adversarial Noise Layer: Regularize Neural Network By Adding Noise"☆16Updated last year
- Knowledge Distillation with Adversarial Samples Supporting Decision Boundary (AAAI 2019)☆71Updated 6 years ago
- Code for CVPR2019 paper《Unequal Training for Deep Face Recognition with Long Tailed Noisy Data》☆69Updated 6 years ago
- ☆37Updated 5 years ago
- My implementation of RePr training scheme in PyTorch. https://arxiv.org/pdf/1811.07275.pdf☆71Updated 6 years ago
- Official Implementation of MEAL: Multi-Model Ensemble via Adversarial Learning on AAAI 2019☆177Updated 5 years ago
- My implementation of Spectral-Feature-Transformation-ReID, link to the paper: https://arxiv.org/abs/1811.11405☆21Updated 6 years ago
- Tools for computing model parameters and FLOPs.☆88Updated 6 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 7 years ago
- Semi-supervised Adaptive Distillation is a model compression method for object detection.☆59Updated 6 years ago
- A simple baseline for Person ReID, it achieves 3rd place in VisDA2020 challenge.☆38Updated 5 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆166Updated 6 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆15Updated 5 years ago
- This project is the Torch implementation of our accepted CVPR 2019 paper, Iterative Normalization: Beyond Standardization towards Effic…☆25Updated 4 years ago
- Gradually Updated Neural Networks for Large-Scale Image Recognition at ICML 2018☆10Updated 7 years ago
- Robustness vs Accuracy Survey on ImageNet☆99Updated 4 years ago
- Code for our paper "Looking for the Devil in the Details: Learning Trilinear Attention Sampling Network for Fine-grained Image Recognitio…☆53Updated 4 years ago
- PyTorch implementation for GAL.☆56Updated 5 years ago
- TOP4 solution of 2019 iQIYI Celebrity Video Identification Challenge☆19Updated 5 years ago
- IJCV22 Attack your retrieval model via Query! They are not robust as you expected!☆47Updated 2 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆61Updated 6 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Updated 4 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 7 years ago
- A fast sparse attack on deep neural networks.☆50Updated 5 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Updated 6 years ago
- [CVPR 2020] Dynamic Hierarchical Mimicking Towards Consistent Optimization Objectives☆84Updated 5 years ago