prabhant / synthesizing-robust-adversarial-examplesView external linksLinks
My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-AW
☆72Apr 5, 2018Updated 7 years ago
Alternatives and similar repositories for synthesizing-robust-adversarial-examples
Users that are interested in synthesizing-robust-adversarial-examples are comparing it to the libraries listed below
Sorting:
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 6 months ago
- ☆14Jul 25, 2020Updated 5 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 4 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆93Mar 24, 2023Updated 2 years ago
- 😎 A curated list of awesome real-world adversarial examples resources☆62Jul 29, 2020Updated 5 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- Adversarial Texture for Fooling Person Detectors in the Physical World☆61Oct 20, 2024Updated last year
- PyTorch implementation of Adversarial Patch☆15Jul 6, 2023Updated 2 years ago
- ☆23Sep 1, 2020Updated 5 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- ☆44May 8, 2020Updated 5 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆167Jan 13, 2020Updated 6 years ago
- Forked for gitlab, https://gitlab.com/EAVISE/adversarial-yolo☆21May 15, 2019Updated 6 years ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆55Oct 25, 2022Updated 3 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 6 years ago
- ☆23Jun 25, 2023Updated 2 years ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆42Aug 13, 2023Updated 2 years ago
- Adversarial Detection v.s. Object Detection.☆14Jul 29, 2023Updated 2 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51May 9, 2025Updated 9 months ago
- AAAI 2019 oral presentation☆53May 30, 2025Updated 8 months ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 2 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Apr 4, 2023Updated 2 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 5 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- PyTorch implementation of adversarial patch☆215Mar 9, 2022Updated 3 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- A paper list for localized adversarial patch research☆160Jul 28, 2025Updated 6 months ago
- An adversarial attack on object detectors☆148Oct 12, 2021Updated 4 years ago
- ☆17Dec 5, 2025Updated 2 months ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆200Mar 27, 2023Updated 2 years ago
- ☆38Jul 13, 2020Updated 5 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 4 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆87Jun 9, 2022Updated 3 years ago
- Public repo for transferability ICLR 2017 paper☆53Jan 3, 2019Updated 7 years ago