Adversarial queries for blocking Content-based Image Retrieval (CBIR)
☆14May 3, 2019Updated 6 years ago
Alternatives and similar repositories for PIRE
Users that are interested in PIRE are comparing it to the libraries listed below
Sorting:
- Targeted Mismatch Adversarial Attack☆17Aug 12, 2019Updated 6 years ago
- 读取ICESat-2 ATL03数据,重建ATL03光子沿轨道距离,从ATL08中获取ATL03光子分类信息☆12Apr 27, 2024Updated last year
- Codes for Arctic river segmentation using various fully convolutional neural networks.☆10Dec 27, 2022Updated 3 years ago
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆31Jun 9, 2020Updated 5 years ago
- This repository are used to retrieve the chlorophyll-a concentration from Landsat-8 OLI.☆11Sep 29, 2025Updated 5 months ago
- ☆10May 18, 2024Updated last year
- Looking at melt lakes on Amery Ice Shelf from space.☆13Nov 30, 2020Updated 5 years ago
- paper:基于特征残差学习和图像转换的异源图像块匹配方法研究(Element-wise Feature Relation Learning Network for Cross-Spectral Image Patch Matching)☆13Jun 23, 2022Updated 3 years ago
- El0ps: An Exact L0-Problem Solver☆13Jan 6, 2026Updated last month
- Algorithms to derive an operational multisource land surface phenology product from Landsat and Sentinel 2☆14Jan 30, 2026Updated last month
- This project aims to perform waterbodies segmentation of Toushka lakes, located in the southern desert of Egypt. The segmentation task is…☆12Oct 2, 2024Updated last year
- A seafloor mapping model based on PointNet++☆13Jan 8, 2024Updated 2 years ago
- learn image embedding by triplet loss model with PyTorch☆10Dec 5, 2018Updated 7 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- MIVI : Multi-stage Feature Matching for Infrared and Visible Image☆12Jan 4, 2023Updated 3 years ago
- Official implementation of NeurIPS'24 Spotlight paper "Monte Carlo Tree Search based Space Transfer for Black-box Optimization".☆12Nov 28, 2024Updated last year
- Image Matching for Crop Fields Using Similarity Invariant Geometric Feature☆10Feb 10, 2021Updated 5 years ago
- Code for Enhancing Self-supervised Video Representation Learning via Multi-level Feature Optimization.☆10Sep 28, 2021Updated 4 years ago
- Detailed guide to help you understand how to train CRF as RNN☆10May 26, 2017Updated 8 years ago
- Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness. (MD attacks)☆11Aug 29, 2020Updated 5 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- Satellite Derived Bathymetry with IceSAT-2 LiDAR Data : Case Study in the coast of Thailand - Thepchai Srinoi and Dr.Phisan Santitamnont …☆13Apr 25, 2024Updated last year
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- a pytorch implementation to fine-grained few shot classification using triplet loss☆11Feb 24, 2019Updated 7 years ago
- ☆17Sep 13, 2024Updated last year
- ☆12Nov 19, 2016Updated 9 years ago
- Code of the paper "Part Detector Discovery in Deep Convolutional Neural Networks" by Marcel Simon, Erik Rodner and Joachim Denzler☆17Nov 12, 2014Updated 11 years ago
- ☆13Nov 26, 2023Updated 2 years ago
- Implementation related to the paper: Interpretability-guided Content-based Medical Image Retrieval☆12Nov 13, 2020Updated 5 years ago
- ☆12Mar 15, 2019Updated 6 years ago
- Constrainted optimization algorithms in python including linear conjugate gradient, log barrier, primal-dual interior-point methods☆12Jul 7, 2019Updated 6 years ago
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 5 months ago
- Rapid Analysis of ICESat-2 Data☆15May 17, 2023Updated 2 years ago
- The purpose of Raster Fairy is to transform any kind of 2D point cloud into a regular raster whilst trying to preserve the neighborhood r…☆13Apr 18, 2017Updated 8 years ago
- Implementation of the most important parts of the Lottery Ticket Hypothesis Paper☆12Jul 2, 2018Updated 7 years ago
- source code for paper "Accelerate Learning of Deep Hashing With Gradient Attention" (ICCV 2019)☆11Jan 14, 2020Updated 6 years ago