面向目标检测的对抗样本攻击
☆25Mar 17, 2021Updated 5 years ago
Alternatives and similar repositories for object-detection-attacks
Users that are interested in object-detection-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆43Oct 24, 2021Updated 4 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆52Feb 27, 2021Updated 5 years ago
- 六代兴亡如梦,苒苒惊时月。纵使岁寒途远,此志应难夺。☆11Mar 15, 2020Updated 6 years ago
- Type-Specific Adversarial Attack for Object Detection☆13Aug 27, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The repo is a source code for the project on Adversarial examples on Semantic Segmentation Networks☆13Sep 12, 2021Updated 4 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆118Jun 3, 2019Updated 6 years ago
- Adversarial attack to detectors☆46Oct 23, 2021Updated 4 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51May 9, 2025Updated 10 months ago
- Implementation of AAAI 2022 Paper: Context-Aware Transfer Attacks for Object Detection☆20Feb 28, 2022Updated 4 years ago
- 华中科技大学计算机视觉实验,基于卷积神经网络的手写数字识别,和快速梯度下降法(FGSM)的攻击以及基于对抗训练的防御。☆14Feb 20, 2023Updated 3 years ago
- A simple tutorial on adversarial attacks against deep neural networks☆32Nov 10, 2025Updated 4 months ago
- Code repository for Ensemble-based Blackbox Attacks on Dense Prediction (EBAD), CVPR 2023☆28May 17, 2024Updated last year
- Shift-Tolerant Perceptual Similarity Metric for Full Reference Image Dehazing Quality Assessment☆19Sep 28, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Paperlist of Adversarial Attack on Object Detection☆124Mar 16, 2023Updated 3 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆34Mar 16, 2022Updated 4 years ago
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆100Jun 30, 2025Updated 8 months ago
- [ICCV 2023] Towards Building More Robust Models with Frequency Bias☆19Feb 27, 2024Updated 2 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆126Jan 30, 2018Updated 8 years ago
- 2022华科网安可信计算实验☆12Jun 25, 2022Updated 3 years ago
- 遗传算法优化卷积神经网络(人脸识别分类)☆13Jun 13, 2019Updated 6 years ago
- Training Segment Anything Model(SAM) by MetaAI from scratch and fine-tuning it with NDIS Park(Night and Day Instance Segmented Park) data…☆13Jun 21, 2025Updated 9 months ago
- ☆16Dec 12, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This script segment an image into superpixels using the sclic algorithm combined with DBSCAN☆13Apr 29, 2020Updated 5 years ago
- 2024届求职-C++后端-学习笔记-操作系统、计算机网络、C++语言+算法☆13Oct 31, 2023Updated 2 years ago
- TextCenGen introduces a dynamic adaptation of the blank region for text-friendly image generation, and enhances T2I model outcomes on arb…☆38Jul 7, 2025Updated 8 months ago
- ☆12May 10, 2018Updated 7 years ago
- Pytorch implementation of "Multi-scale Single Image Dehazing using Perceptual Pyramid Deep Network"☆19Apr 23, 2018Updated 7 years ago
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆12Feb 5, 2025Updated last year
- 😎 A curated list of awesome real-world adversarial examples resources☆62Jul 29, 2020Updated 5 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Adversarial Detection v.s. Object Detection.☆14Jul 29, 2023Updated 2 years ago
- Road traffic simulator for OpenAI Gym☆13Feb 3, 2021Updated 5 years ago
- Official implemention of the paper High-Resolution and Precise Counterfactual Medical Image Generation using Language-guided Stable Diffu…☆23Jul 8, 2025Updated 8 months ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆44Mar 24, 2023Updated 3 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- Label smoothed Aggregation cross entropy loss for generalisation in sequence to sequence tasks.☆14Dec 17, 2019Updated 6 years ago
- 🐼 Easy to use and portable pronunciation data for Hanzi characters.☆15Feb 27, 2017Updated 9 years ago