A TensorFlow implementation for Synthesizing Robust Adversarial Examples.
☆14Oct 4, 2023Updated 2 years ago
Alternatives and similar repositories for adversarial-3d
Users that are interested in adversarial-3d are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆73Apr 5, 2018Updated 8 years ago
- PyTorch implementation of adversarial patch☆215Mar 9, 2022Updated 4 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 5 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆168Jan 13, 2020Updated 6 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆36Sep 19, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Sep 22, 2023Updated 2 years ago
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆33May 24, 2018Updated 7 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- Implementation of AugMix (2020) in TensorFlow☆16May 27, 2022Updated 3 years ago
- Official code for "TWINS: A Fine-Tuning Framework for Improved Transferability of Adversarial Robustness and Generalization", CVPR 2023☆13Apr 26, 2023Updated 3 years ago
- Feature Separation and Recalibration (CVPR 2023 Highlights)☆33Dec 12, 2023Updated 2 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- ☆44May 8, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆48Feb 9, 2021Updated 5 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆129Jan 30, 2018Updated 8 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆139Dec 16, 2020Updated 5 years ago
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- Unsupervised Model-based Dense Face Alignment☆10Aug 27, 2020Updated 5 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆59Jan 31, 2020Updated 6 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60May 14, 2019Updated 7 years ago
- Official code implement of "Your Diffusion Model is Secretly a Certifiably Robust Classifier"☆18Feb 2, 2024Updated 2 years ago
- Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness. (MD attacks)☆11Aug 29, 2020Updated 5 years ago
- ☆22Apr 15, 2022Updated 4 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- Mode normalization (ICLR 2019).☆18Feb 27, 2019Updated 7 years ago
- Create virtual machine on a server from docker(support deep learning)☆13Sep 14, 2020Updated 5 years ago
- ☆11May 11, 2016Updated 10 years ago
- ☆12Aug 12, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13May 24, 2023Updated 2 years ago
- A Paperlist of Adversarial Attack on Object Detection☆125Mar 16, 2023Updated 3 years ago
- ☆11Jun 9, 2023Updated 2 years ago
- ☆26Dec 23, 2021Updated 4 years ago
- Official Implementation of Harnessing Perceptual Adversarial Patches for Crowd Counting (ACM CCS)☆18Apr 28, 2023Updated 3 years ago
- ☆21Jul 16, 2019Updated 6 years ago
- ☆14Apr 18, 2022Updated 4 years ago