jiawangbai / DHTA-masterView external linksLinks
The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.
☆28Jun 7, 2021Updated 4 years ago
Alternatives and similar repositories for DHTA-master
Users that are interested in DHTA-master are comparing it to the libraries listed below
Sorting:
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆18Jul 20, 2021Updated 4 years ago
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆17Sep 1, 2023Updated 2 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 2 years ago
- ☆15Mar 20, 2020Updated 5 years ago
- ☆24Jul 12, 2022Updated 3 years ago
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- ☆12May 27, 2022Updated 3 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago
- Source code for paper "Adversary Guided Asymmetric Hashing for Cross-Modal Retrieval".☆39Sep 4, 2019Updated 6 years ago
- source code for paper "Deep Incremental Hashing Network for Efficient Image Retrieval" on CVPR-2019☆70Dec 31, 2019Updated 6 years ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆20Sep 29, 2022Updated 3 years ago
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- Implementation of HAT https://arxiv.org/pdf/2204.00993☆51Mar 23, 2024Updated last year
- A Unified Benchmark and Toolbox for Multimodal Jailbreak Attack–Defense Evaluation☆57Jan 23, 2026Updated 3 weeks ago
- PyTorch Code for Feature Boosting, Suppression, and Diversification for Fine-Grained Visual Classification☆23Apr 16, 2021Updated 4 years ago
- Code for AAAI 2021 paper ``MetaAttack"☆26Jun 10, 2021Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Dec 31, 2024Updated last year
- Tensorflow Implementation on Paper [CVPR2020]Image Search with Text Feedback by Visiolinguistic Attention Learning☆63Sep 12, 2020Updated 5 years ago
- Implementation of Some Deep Hash Algorithms, Including DPSH、DSH、DHN、HashNet、DSDH、DTSH、DFH、GreedyHash、CSQ.☆543Sep 19, 2022Updated 3 years ago
- Face Verification Example with Flower / Federated Learning☆12Apr 3, 2023Updated 2 years ago
- A Python implementation of the Hopfield network used to solve the traveling salesman problem☆10Apr 11, 2019Updated 6 years ago
- Convolutional Channel-wise Competitive Learning for the Forward-Forward Algorithm. AAAI 2024☆11Jun 27, 2024Updated last year
- HPA2021 solution (3rd place)☆10Oct 13, 2021Updated 4 years ago
- DisTime: Distribution-based Time Representation for Video Large Language Models.☆18Jul 10, 2025Updated 7 months ago
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆75Dec 5, 2022Updated 3 years ago
- Implementation for the paper "Latent Weights Do Not Exist: Rethinking Binarized Neural Network Optimization"☆76Dec 8, 2019Updated 6 years ago
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (ICML 2021)☆74Aug 5, 2021Updated 4 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆35Apr 19, 2023Updated 2 years ago
- Code for "Neural Tangent Generalization Attacks" (ICML 2021)☆41Jul 29, 2021Updated 4 years ago
- ☆12Sep 11, 2021Updated 4 years ago
- FOR FRESHMAN IN NUDT CORE LAB RESEARCH AND CODING TOOLS☆10Jun 19, 2022Updated 3 years ago
- Sample implementation accompanying the NeurIPS 2019 paper 'Powerset Convolutional Neural Networks' by Chris Wendler, Dan Alistarh, and Ma…☆10Oct 26, 2020Updated 5 years ago
- ☆19Mar 10, 2025Updated 11 months ago
- gNucleus Text To CAD MCP server☆14Jul 30, 2025Updated 6 months ago
- Implementation of BinaryConnect on Pytorch☆39Apr 28, 2021Updated 4 years ago
- RTL implementation of TFlite FPGA accelerator and RISC-V controller. 3D Object Detection based on LiDAR Point Clouds.☆15Mar 12, 2023Updated 2 years ago
- [AAAI'20] Code release for "HAL: Improved Text-Image Matching by Mitigating Visual Semantic Hubs".☆38Oct 4, 2023Updated 2 years ago
- [AAAI2024] An official pytorch implement of the paper: Vision-Language Pre-training with Object Contrastive Learning for 3D Scene Underst…☆13Dec 8, 2024Updated last year