Code for the AAAI 2023 paper: "Global-Local Characteristic Excited Cross-Modal Attacks from Images to Video" (accepted).
☆14Feb 25, 2024Updated 2 years ago
Alternatives and similar repositories for Cross-Modal-Attack
Users that are interested in Cross-Modal-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the AAAI 2024 paper: "AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack" (accepted).☆12Mar 28, 2024Updated last year
- ☆17Sep 23, 2022Updated 3 years ago
- Cross-Modal Transferable Adversarial Attacks from Images to Videos (CVPR 2022)☆21Jul 3, 2024Updated last year
- This repository is used for sharing the source code of Double low-rank representation with projection distance penalty for clustering☆12Jan 26, 2022Updated 4 years ago
- [ICCV2023] DR-Tune: Improving Fine-tuning of Pretrained Visual Models by Distribution Regularization with Semantic Calibration☆12Oct 12, 2023Updated 2 years ago
- ☆37Jul 3, 2024Updated last year
- The release version of OMCmf code for paper "One-pass Multi-view Clustering with Matrix Factorization"☆13Nov 30, 2021Updated 4 years ago
- [ICCV 2025] The official pytorch implement of "LLaVA-SP: Enhancing Visual Representation with Visual Spatial Tokens for MLLMs".☆22Oct 28, 2025Updated 4 months ago
- [ECCV2022] Motion Sensitive Contrastive Learning for Self-supervised Video Representation☆17Aug 12, 2022Updated 3 years ago
- Towards Deep Learning Models Resistant to Adversarial Attacks论文复现☆15Aug 18, 2021Updated 4 years ago
- ☆17Jun 10, 2024Updated last year
- Unofficial Python implementation about Image Zooming Using Directional Cubic Convolution Interpolation (DCC) by Numpy.☆18May 6, 2022Updated 3 years ago
- ☆15Mar 12, 2022Updated 4 years ago
- Codes when studying from books or tutorials☆12Sep 22, 2020Updated 5 years ago
- Methods used in the paper "Plausible Uncertainties for Human Pose Regression".☆14Aug 13, 2024Updated last year
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020)☆10Jan 5, 2022Updated 4 years ago
- An unofficial implementation of 'Inverse-Transform AutoEncoder for Anomaly Detection', paper see https://arxiv.org/abs/1911.10676☆13Aug 7, 2020Updated 5 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆13Feb 28, 2024Updated 2 years ago
- ☆12Sep 11, 2024Updated last year
- ☆23Jul 8, 2023Updated 2 years ago
- 修改自梦幻星空的frp脚本。 frp配置脚本,windows/linux/mac通用,可配置frpc和frps。 可一键添加开机启动☆11Mar 3, 2019Updated 7 years ago
- ☆21Sep 23, 2025Updated 6 months ago
- Self-Supervised Convolutional Subspace Clustering Network☆14Jun 2, 2019Updated 6 years ago
- Introduction and related code for our NeurIPS22 paper ‘ Align then Fusion: Generalized Large-scale Multi-view Clustering with Anchor Matc…☆23Oct 24, 2022Updated 3 years ago
- Dual-level deep evidential fusion☆11Mar 19, 2024Updated 2 years ago
- Implementation of "Binary Graph Convolutional Network", CVPR 2021, and TPAMI 2024.☆26Apr 8, 2024Updated last year
- Rnalytica: An R package of JIRA defect datasets and tool suites for actionable software analytics☆12Aug 12, 2020Updated 5 years ago
- Continual Evidential Deep Learning ICCVW 2023☆14Nov 3, 2023Updated 2 years ago
- Chronos: Zero-Shot Identification of Libraries from Vulnerability Reports (ICSE 2023, Technical Track)☆11Jul 23, 2023Updated 2 years ago
- The replication package of "CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back""☆13Feb 8, 2023Updated 3 years ago
- ☆12Feb 23, 2023Updated 3 years ago
- Implementation for <Robust Weight Perturbation for Adversarial Training> in IJCAI'22.☆16Jul 1, 2022Updated 3 years ago
- ☆11Jun 13, 2024Updated last year
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- ☆29Oct 8, 2024Updated last year
- the tensorflow code for Self-Supervised Adversarial Hashing Networks for Cross-Modal Retrieval☆39Oct 24, 2018Updated 7 years ago
- [ECCV 2024] Towards Reliable Evaluation and Fast Training of Robust Semantic Segmentation Models☆21Jul 17, 2024Updated last year
- Code and videos accompanying the paper "Flickering Adversarial Attacks against Video Recognition Networks"☆16Dec 8, 2022Updated 3 years ago