jiawangbai / DHTA-masterLinks
The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.
☆28Updated 4 years ago
Alternatives and similar repositories for DHTA-master
Users that are interested in DHTA-master are comparing it to the libraries listed below
Sorting:
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆36Updated 2 years ago
- The Project of Our ICCV Paper☆10Updated 4 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆36Updated 4 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆61Updated 2 years ago
- ☆23Updated 3 years ago
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆72Updated 2 years ago
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆41Updated 3 years ago
- Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder(CVPR2020)☆12Updated 4 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Updated 4 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆45Updated 3 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆61Updated 4 years ago
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆31Updated 5 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Updated 2 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆37Updated 3 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Updated 4 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 5 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 6 years ago
- ☆41Updated 3 years ago
- ☆45Updated 5 years ago
- A novel data-free model stealing method based on GAN☆127Updated 2 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆18Updated 3 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆45Updated 4 years ago
- ☆108Updated 3 years ago
- Targeted Mismatch Adversarial Attack☆17Updated 5 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Updated last year
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Updated 3 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆17Updated 4 years ago
- [CVPR 2022 oral] Subspace Adversarial Training☆27Updated 2 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆58Updated 4 years ago