omidmnezami / pick-object-attackLinks
Type-Specific Adversarial Attack for Object Detection
☆13Updated 4 years ago
Alternatives and similar repositories for pick-object-attack
Users that are interested in pick-object-attack are comparing it to the libraries listed below
Sorting:
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Updated 2 years ago
- An adversarial attack on object detectors☆148Updated 4 years ago
- ☆14Updated 5 years ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Updated 4 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46Updated 2 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Updated 3 years ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆52Updated 4 years ago
- A paper list for localized adversarial patch research☆160Updated 6 months ago
- A Paperlist of Adversarial Attack on Object Detection☆125Updated 2 years ago
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆32Updated 2 years ago
- Paper list of Adversarial Examples☆52Updated 2 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Updated 2 years ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆104Updated 4 years ago
- [CVPR 2024] "Transferable Structural Sparse Adversarial Attack Via Exact Group Sparsity Training", Di Ming, Peng Ren, Yunlong Wang, Xin …☆16Updated last year
- ☆53Updated 4 years ago
- ICCV 2021☆14Updated 4 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆140Updated 5 months ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Updated 6 years ago
- Adversarial Texture for Fooling Person Detectors in the Physical World☆61Updated last year
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆116Updated 6 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆44Updated 2 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Updated 6 years ago
- Pytorch implementation of Adversarial Patch on ImageNet (arXiv: https://arxiv.org/abs/1712.09665)☆64Updated 5 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆437Updated 3 weeks ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Updated 4 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆73Updated 7 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆12Updated last year
- ☆67Updated 3 years ago
- https://arxiv.org/pdf/1906.11897.pdf☆23Updated 4 years ago
- ICCV 2021☆32Updated 4 years ago