☆12Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for DefensivePatch
Users that are interested in DefensivePatch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- ☆12Sep 14, 2021Updated 4 years ago
- [ICCV 2023] Towards Building More Robust Models with Frequency Bias☆19Feb 27, 2024Updated 2 years ago
- ☆17Nov 15, 2021Updated 4 years ago
- Official Implementation of Harnessing Perceptual Adversarial Patches for Crowd Counting (ACM CCS)☆18Apr 28, 2023Updated 2 years ago
- PyTorch implementation of Adversarial Patch☆15Jul 6, 2023Updated 2 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- 自制Orange操作系统☆17Feb 9, 2018Updated 8 years ago
- ☆44May 8, 2020Updated 5 years ago
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago
- The proliferation of fake news on social media sites is a serious problem with documented negative impacts on individuals and organizatio…☆12Oct 24, 2020Updated 5 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- PyTorch implementation of adversarial patch☆216Mar 9, 2022Updated 4 years ago
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated last year
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- PE文件格式学习资料☆19Apr 19, 2018Updated 7 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- Developing different methods for expanding a query/topic in information retrieval and choosing the best expanded query using similarity m…☆11May 17, 2017Updated 8 years ago
- ☆82Oct 24, 2022Updated 3 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆63Sep 16, 2025Updated 6 months ago
- ☆11Apr 6, 2024Updated last year
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- ☆38Jul 13, 2020Updated 5 years ago
- ☆37Jul 3, 2024Updated last year
- The first comprehensive Robustness investigation benchmark on large-scale dataset ImageNet regarding ARchitecture design and Training tec…☆150Feb 4, 2026Updated last month
- ☆31Jun 22, 2021Updated 4 years ago
- A prototype of information retrieval system inclduing the document parsing, index construction, query parsing to support the vector space…☆15May 16, 2023Updated 2 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- A toy os. 《自己动手写操作系统》 《Orange'S 一个操作系统的实现》☆10Mar 10, 2023Updated 3 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆82Aug 4, 2021Updated 4 years ago
- A tool to explore/extract Ace Combat 4/5/0's files.☆12Apr 23, 2022Updated 3 years ago
- 毕设 实验☆11Jan 2, 2019Updated 7 years ago
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 11 months ago