☆14Jul 25, 2020Updated 5 years ago
Alternatives and similar repositories for Digital2Physical
Users that are interested in Digital2Physical are comparing it to the libraries listed below
Sorting:
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 4 years ago
- Adversarial Detection v.s. Object Detection.☆14Jul 29, 2023Updated 2 years ago
- Adversarial Texture for Fooling Person Detectors in the Physical World☆61Oct 20, 2024Updated last year
- Pytorch implementation of Adversarial Patch on ImageNet (arXiv: https://arxiv.org/abs/1712.09665)☆63Mar 22, 2020Updated 5 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 7 months ago
- ☆38Jul 13, 2020Updated 5 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 6 years ago
- Official Implementation of Harnessing Perceptual Adversarial Patches for Crowd Counting (ACM CCS)☆18Apr 28, 2023Updated 2 years ago
- ICCV 2021☆32Oct 6, 2021Updated 4 years ago
- ☆23Jun 25, 2023Updated 2 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51May 9, 2025Updated 9 months ago
- 😎 A curated list of awesome real-world adversarial examples resources☆62Jul 29, 2020Updated 5 years ago
- ☆23Sep 1, 2020Updated 5 years ago
- AAAI 2019 oral presentation☆53May 30, 2025Updated 9 months ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- PyTorch implementation of EdgeFool: An Adversarial Image Enhancement Filter, ICASSP2020☆26Feb 14, 2020Updated 6 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 5 years ago
- ☆37Nov 16, 2025Updated 3 months ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆32Oct 9, 2023Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- [NeurIPS 2025] Sparse Autoencoders Learn Monosemantic Features in Vision-Language Models☆64Nov 27, 2025Updated 3 months ago
- ☆33Sep 9, 2020Updated 5 years ago
- Spatially Transformed Adversarial Examples with TensorFlow☆75Nov 3, 2018Updated 7 years ago
- read and write operations across cloud providers☆11Apr 23, 2019Updated 6 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆38Jun 14, 2023Updated 2 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆100Jun 30, 2025Updated 8 months ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- ☆10Dec 18, 2024Updated last year
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- SEED Labs学习笔记☆10Apr 10, 2018Updated 7 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 2 years ago