lxuniverse / gdpaView external linksLinks
☆15Oct 21, 2021Updated 4 years ago
Alternatives and similar repositories for gdpa
Users that are interested in gdpa are comparing it to the libraries listed below
Sorting:
- Robust Camera Trace Extraction (TIFS'23)☆12Oct 3, 2023Updated 2 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Dec 2, 2020Updated 5 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- Code for our NeurIPS 2023 paper Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly☆14Jan 22, 2024Updated 2 years ago
- ☆15Apr 7, 2023Updated 2 years ago
- Materials for the paper https://arxiv.org/pdf/2007.15036.pdf☆14Aug 3, 2020Updated 5 years ago
- Official implementation of "Can You Spot the Chameleon? Adversarially Camouflaging Images from Co-Salient Object Detection" in CVPR 2022.☆19Mar 28, 2022Updated 3 years ago
- Implementation for "Defense-VAE: A Fast and Accurate Defense against Adversarial Attacks"☆14Dec 23, 2020Updated 5 years ago
- ☆19Jul 3, 2025Updated 7 months ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- Code for L0-ARM: Network Sparsification via Stochastic Binary Optimization☆15Oct 25, 2019Updated 6 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago
- ☆25Apr 16, 2021Updated 4 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Jun 30, 2020Updated 5 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆24Nov 30, 2023Updated 2 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- ☆28Sep 22, 2022Updated 3 years ago
- A curated list of papers for the transferability of adversarial examples☆76Jul 8, 2024Updated last year
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Updated this week
- ☆10May 22, 2024Updated last year
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆34Jul 15, 2021Updated 4 years ago
- ☆12May 6, 2022Updated 3 years ago
- ☆33Sep 9, 2020Updated 5 years ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- PyTorch implementation of denoising diffusion probabilistic models.☆32Apr 13, 2021Updated 4 years ago
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- CASME II: An Improved Spontaneous Micro-Expression Database and the Baseline Evaluation☆10Oct 19, 2018Updated 7 years ago
- ☆17Feb 6, 2024Updated 2 years ago
- ☆11Dec 9, 2018Updated 7 years ago
- BBO optimiser☆11Feb 11, 2020Updated 6 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- ☆19Jul 1, 2023Updated 2 years ago
- ☆11Oct 30, 2024Updated last year
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Nov 28, 2023Updated 2 years ago
- ☆42Jan 25, 2024Updated 2 years ago
- A paper list for localized adversarial patch research☆160Jul 28, 2025Updated 6 months ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year