Code for NDSS paper: Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems
☆21Nov 24, 2018Updated 7 years ago
Alternatives and similar repositories for Video-Perturbation
Users that are interested in Video-Perturbation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- ☆19Jun 26, 2021Updated 4 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- ☆14Mar 1, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PyTorch Implementation of the paper "Defining and Quantifying the Emergence of Sparse Concepts in DNNs" (CVPR 2023)☆12Dec 24, 2023Updated 2 years ago
- SVIP: Towards Verifiable Inference of Open-Source Large Language Models☆15Jun 3, 2025Updated 10 months ago
- Code for IJCAI 2019 paper "Real-time Adversarial Attack".☆20Jul 4, 2020Updated 5 years ago
- Code release for Catastrophic Forgetting Meets Negative Transfer: Batch Spectral Shrinkage for Safe Transfer Learning (NeurIPS 2019)☆24Nov 29, 2021Updated 4 years ago
- Task-agnostic universal black-box attacks on computer vision neural network via procedural noise (CCS'19)☆55Dec 21, 2020Updated 5 years ago
- Understanding the Robustness of Skeleton-based Action Recognition under Adversarial Attack CVPR 2021☆14Mar 8, 2024Updated 2 years ago
- Official Implementation of Harnessing Perceptual Adversarial Patches for Crowd Counting (ACM CCS)☆18Apr 28, 2023Updated 2 years ago
- [CVPR 2024] "Transferable Structural Sparse Adversarial Attack Via Exact Group Sparsity Training", Di Ming, Peng Ren, Yunlong Wang, Xin …☆16Jun 11, 2024Updated last year
- ☆23Apr 10, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆23Feb 5, 2026Updated 2 months ago
- This is a python script to generate nice bibtex file for latex.☆19Mar 1, 2020Updated 6 years ago
- BASAR:Black-box Attack on Skeletal Action Recognition, CVPR 2021☆19Feb 18, 2025Updated last year
- scene classification for 360 photos☆12Jun 29, 2017Updated 8 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- Some outlier_detection methods: Robust PCA (RPCA), Randomized RPCA, Robust Autoencoder☆10Dec 10, 2018Updated 7 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- GPU accelerated Perlin Noise in python☆11Oct 23, 2020Updated 5 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for paper "PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking"☆74Jul 13, 2022Updated 3 years ago
- The most comprehensive and accurate LLM jailbreak attack benchmark by far☆21Mar 22, 2025Updated last year
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆32Apr 27, 2022Updated 3 years ago
- [AAAI 2024] Direction-aware Video Demoiréing with Temporal-guided Bilateral Learning☆15Dec 13, 2023Updated 2 years ago
- A Framework for Evaluating AI Agent Safety in Realistic Environments☆31Oct 2, 2025Updated 6 months ago
- Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX …☆19Nov 28, 2018Updated 7 years ago
- An easy-to-use Python framework to defend against jailbreak prompts.☆21Mar 22, 2025Updated last year
- Tensorflow code for Sparse Adversarial Perturbations for Videos☆23Mar 8, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for "Imitation Attacks and Defenses for Black-box Machine Translations Systems"☆33May 1, 2020Updated 5 years ago
- argparse extension for hpman☆17Dec 4, 2022Updated 3 years ago
- MultipleStyleCheckBoxKit have multiple style check box, due with multiple line text, network photo, local photo, useful on news vote. …☆17Mar 16, 2016Updated 10 years ago
- Deep learning application☆10Dec 11, 2016Updated 9 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- Implementation of a network for Handwriting Synthesis based on the work of Generating Sequences With Recurrent Neural Networks by Alex Gr…☆11May 12, 2025Updated 11 months ago