☆67Jun 2, 2022Updated 3 years ago
Alternatives and similar repositories for DualAttentionAttack
Users that are interested in DualAttentionAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆58Oct 25, 2022Updated 3 years ago
- https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/☆20May 9, 2022Updated 3 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- ☆44May 8, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [ICML 2024] RAUCA: A robust and accurate adversarial camouflage generation method☆25Nov 29, 2025Updated 4 months ago
- [TDSC 2025] Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors☆16Aug 12, 2025Updated 8 months ago
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆42Aug 6, 2024Updated last year
- ICCV 2021☆34Oct 6, 2021Updated 4 years ago
- A Paperlist of Adversarial Attack on Object Detection☆124Mar 16, 2023Updated 3 years ago
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆44Oct 24, 2021Updated 4 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 3 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- ☆40Jan 7, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆93Mar 24, 2023Updated 3 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- Adversarial Texture for Fooling Person Detectors in the Physical World☆63Oct 20, 2024Updated last year
- PatchAttack (ECCV 2020)☆65May 22, 2020Updated 5 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Official Implementation of Harnessing Perceptual Adversarial Patches for Crowd Counting (ACM CCS)☆18Apr 28, 2023Updated 2 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- A curated list of papers for the transferability of adversarial examples☆77Jul 8, 2024Updated last year
- ☆13Dec 8, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆132Apr 4, 2023Updated 3 years ago
- ☆17Nov 15, 2021Updated 4 years ago
- An adversarial attack on object detectors☆147Oct 12, 2021Updated 4 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- AdvT-shirt-1K A Physical-world Adversarial T-shirt Dataset for Adversarial Robustness Evaluation☆14Aug 7, 2025Updated 8 months ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Mar 28, 2026Updated 3 weeks ago
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- https://arxiv.org/pdf/1906.11897.pdf☆23Oct 27, 2021Updated 4 years ago
- http://arxiv.org/abs/2403.17301☆54Jan 4, 2026Updated 3 months ago
- Adversarial Robustness, White-box, Adversarial Attack☆50Jul 6, 2022Updated 3 years ago