Code for NDSS paper: Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems
☆21Nov 24, 2018Updated 7 years ago
Alternatives and similar repositories for Video-Perturbation
Users that are interested in Video-Perturbation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- ☆19Jun 26, 2021Updated 4 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- ☆14Mar 1, 2019Updated 7 years ago
- PyTorch Implementation of the paper "Defining and Quantifying the Emergence of Sparse Concepts in DNNs" (CVPR 2023)☆12Dec 24, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SVIP: Towards Verifiable Inference of Open-Source Large Language Models☆15Jun 3, 2025Updated 11 months ago
- Code release for Catastrophic Forgetting Meets Negative Transfer: Batch Spectral Shrinkage for Safe Transfer Learning (NeurIPS 2019)☆24Nov 29, 2021Updated 4 years ago
- Solution to Deepfake Detection Challenge☆27Jun 22, 2022Updated 3 years ago
- Official Implementation of Harnessing Perceptual Adversarial Patches for Crowd Counting (ACM CCS)☆18Apr 28, 2023Updated 3 years ago
- Code Repository for Research Article Titled - "Omnidirectional Video Super-Resolution using Deep Learning"☆14Apr 16, 2023Updated 3 years ago
- [CVPR 2024] "Transferable Structural Sparse Adversarial Attack Via Exact Group Sparsity Training", Di Ming, Peng Ren, Yunlong Wang, Xin …☆16Jun 11, 2024Updated last year
- ☆23Apr 10, 2023Updated 3 years ago
- ☆23Feb 5, 2026Updated 3 months ago
- This is a python script to generate nice bibtex file for latex.☆19Mar 1, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- BASAR:Black-box Attack on Skeletal Action Recognition, CVPR 2021☆19Feb 18, 2025Updated last year
- scene classification for 360 photos☆12Jun 29, 2017Updated 8 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- GPU accelerated Perlin Noise in python☆11Oct 23, 2020Updated 5 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- Code for paper "PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking"☆74Jul 13, 2022Updated 3 years ago
- A Fast PyTorch implementation for ICCV 19 paper "BMN: Boundary-Matching Network for Temporal Action Proposal Generation"☆10Jul 29, 2019Updated 6 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆32Apr 27, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- [AAAI 2024] Direction-aware Video Demoiréing with Temporal-guided Bilateral Learning☆15Dec 13, 2023Updated 2 years ago
- Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX …☆19Nov 28, 2018Updated 7 years ago
- argparse extension for hpman☆17Dec 4, 2022Updated 3 years ago
- MultipleStyleCheckBoxKit have multiple style check box, due with multiple line text, network photo, local photo, useful on news vote. …☆17Mar 16, 2016Updated 10 years ago
- Deep learning application☆10Dec 11, 2016Updated 9 years ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated 2 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- Implementation of the Squarified Treemap algorithm☆11Feb 22, 2017Updated 9 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆43Jan 15, 2025Updated last year
- ☆14Nov 11, 2025Updated 5 months ago
- A feature-complete gate-level microcoded Intel 4004 in 4004 bytes of C, capable of emulating the original Busicom calculator ROM for whic…☆29Aug 5, 2025Updated 9 months ago
- Simple, efficient and flexible vision toolbox for mxnet framework.☆32Nov 28, 2017Updated 8 years ago
- Detect adversarial images from intermediate features in distance space☆12Aug 22, 2018Updated 7 years ago
- MDFlow: Unsupervised Optical Flow Learning by Reliable Mutual Knowledge Distillation (TCSVT 2022)☆16Feb 9, 2023Updated 3 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 4 months ago