Type-Specific Adversarial Attack for Object Detection
☆13Aug 27, 2021Updated 4 years ago
Alternatives and similar repositories for pick-object-attack
Users that are interested in pick-object-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial Detection v.s. Object Detection.☆14Jul 29, 2023Updated 2 years ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆52Feb 27, 2021Updated 5 years ago
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- Implementation of AAAI 2022 Paper: Context-Aware Transfer Attacks for Object Detection☆20Feb 28, 2022Updated 4 years ago
- object detection, adversarial robustness, ICIP2021☆17Jan 10, 2021Updated 5 years ago
- 2024届求职-C++后端-学习笔记-操作系统、计算机网络、C++语言+算法☆13Oct 31, 2023Updated 2 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 3 months ago
- GTNet:Guided Transformer Network for Detecting Human-Object Interactions☆15Apr 4, 2023Updated 2 years ago
- Paper https://arxiv.org/pdf/2306.06071.pdf Analysing how adversarial attacks aaffect YOLO Object Detection and visualising GradCAM☆23Dec 21, 2023Updated 2 years ago
- ☆20Mar 19, 2023Updated 3 years ago
- FirmSec Dataset☆12Sep 1, 2021Updated 4 years ago
- an efficient method for detecting adversarial image examples☆17Jun 3, 2018Updated 7 years ago
- ☆21Mar 14, 2025Updated last year
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- Detecting important corners in images and real-time video using Harris Corner Detector. and Shi-tomasi corner Detector☆16Jul 23, 2018Updated 7 years ago
- SEED Labs学习笔记☆10Apr 10, 2018Updated 7 years ago
- OCaml adapters for crypto providers used in Everest☆10Sep 13, 2018Updated 7 years ago
- Chrome extension: password generator from master key using PBKDF2 with SHA-256.☆19Sep 14, 2015Updated 10 years ago
- A brief writeup for https://github.com/scwuaptx/HITCON-Training☆19Jul 22, 2018Updated 7 years ago
- DEPRECATED: Element Hiding Helper extension for Adblock Plus☆11Dec 1, 2017Updated 8 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- Encoders and Decoders for RF and IR protocols used for remote control and data acquisition. Both Encoders and Decoders can be supplied as…☆13Jul 29, 2017Updated 8 years ago
- A Firefox add-on that warns about changing certificates☆12Dec 1, 2019Updated 6 years ago
- OwnTracks Recorder (Homebrew)☆12Oct 25, 2024Updated last year
- A graphical sudo for the Mac platform☆13Jul 20, 2024Updated last year
- ☆13Dec 2, 2021Updated 4 years ago
- wolfSSL Asynchronous Cryptography☆17Dec 8, 2025Updated 3 months ago
- Readinglist client☆14Mar 12, 2015Updated 11 years ago
- A simple sqlite3 library for Haskell☆21Aug 27, 2018Updated 7 years ago
- A tensorflow implementation and improvement of CVPR 2019 paper 'ComDefend'.☆15Apr 13, 2020Updated 5 years ago
- Implements a simple "Wasp in the Box" algorithm for SmartThings☆11Feb 10, 2015Updated 11 years ago
- ☆11Oct 12, 2022Updated 3 years ago
- ☆13Nov 17, 2022Updated 3 years ago
- Swift Mailboxes as a shameless ripoff of Go's Channel feature☆14May 17, 2015Updated 10 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- A port of the Python subprocess module to Lua☆17Nov 1, 2018Updated 7 years ago