The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.
☆28Jun 7, 2021Updated 4 years ago
Alternatives and similar repositories for DHTA-master
Users that are interested in DHTA-master are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆19Jul 20, 2021Updated 4 years ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆40Aug 28, 2022Updated 3 years ago
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆17Sep 1, 2023Updated 2 years ago
- ☆15Mar 20, 2020Updated 6 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆42Jan 25, 2024Updated 2 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Aug 18, 2020Updated 5 years ago
- ☆24Jul 12, 2022Updated 3 years ago
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆24Mar 23, 2024Updated 2 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago
- Source code for paper "Adversary Guided Asymmetric Hashing for Cross-Modal Retrieval".☆40Sep 4, 2019Updated 6 years ago
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- Code for AAAI 2021 paper ``MetaAttack"☆26Jun 10, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- Implementation of HAT https://arxiv.org/pdf/2204.00993☆51Mar 23, 2024Updated 2 years ago
- [ArXiv 2025] Denial-of-Service Poisoning Attacks on Large Language Models☆23Oct 22, 2024Updated last year
- Source Code for Online Collective Matrix Factorization Hashing. Reference: Di Wang, Quan Wang, Yaqiang An, Xinbo Gao, and Yumin Tian. 202…☆11Oct 20, 2020Updated 5 years ago
- PyTorch Code for Feature Boosting, Suppression, and Diversification for Fine-Grained Visual Classification☆23Apr 16, 2021Updated 5 years ago
- ☆19Jul 20, 2022Updated 3 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆37Apr 19, 2023Updated 2 years ago
- ☆10May 4, 2023Updated 2 years ago
- Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)☆34Aug 18, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Official codes of the paper: Deep Center-Based Dual-Constrained Hashing for Discriminative Face Image Retrieval (DCDH)☆29Jun 14, 2024Updated last year
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆50Apr 8, 2024Updated 2 years ago
- Code and benchmarks for the Semantic Video Retrieval Task☆53Oct 18, 2022Updated 3 years ago
- DeepHash框架,包括DQN、DHN、DVSQ、DCH、DTQ等方法。☆12Jan 18, 2021Updated 5 years ago
- Code release for Grad-CAM Guided Attention Module for Fine-grained Visual Classification (MLSP 2022)☆13Aug 25, 2021Updated 4 years ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆21Sep 29, 2022Updated 3 years ago
- [ICIP 2021] PyTorch code for "The Mind's Eye: Visualizing Class-Agnostic Features of CNNs" for generation of kernel features.☆12Sep 12, 2021Updated 4 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- A repository for the query-efficient black-box attack, SignHunter☆21Jan 15, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for the Joint Part-of-Speech Embedding model☆13Feb 16, 2023Updated 3 years ago
- Code release of "Deep Visual-Semantic Quantization of Efficient Image Retrieval" (CVPR 17)☆11Apr 5, 2017Updated 9 years ago
- An implement of our paper “DEEP ADVERSARIAL QUANTIZATION NETWORK FOR CROSS-MODAL RETRIEVAL”☆10May 16, 2021Updated 4 years ago
- MMAct Challenge☆13Jun 20, 2021Updated 4 years ago
- Delta Development Documentation☆24Jun 8, 2023Updated 2 years ago
- Implementation of Some Deep Hash Algorithms, Including DPSH、DSH、DHN、HashNet、DSDH、DTSH、DFH、GreedyHash、CSQ.☆548Sep 19, 2022Updated 3 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago