The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]
☆31Jun 9, 2020Updated 5 years ago
Alternatives and similar repositories for UAP_retrieval
Users that are interested in UAP_retrieval are comparing it to the libraries listed below
Sorting:
- Targeted Mismatch Adversarial Attack☆17Aug 12, 2019Updated 6 years ago
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Jun 7, 2021Updated 4 years ago
- ☆15Mar 20, 2020Updated 5 years ago
- ☆10May 4, 2023Updated 2 years ago
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆46Apr 16, 2019Updated 6 years ago
- Code for AAAI 2021 paper ``MetaAttack"☆26Jun 10, 2021Updated 4 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- Repository for the paper "Data Efficient Masked Language Modeling for Vision and Language".☆18Sep 17, 2021Updated 4 years ago
- Universal Adversarial Perturbations based on the (p, q)-singular vectors.☆12Jan 8, 2018Updated 8 years ago
- The code of paper: Robust Face Sketch Synthesis via Generative Adversarial Fusion of Priors and Parametric Sigmoid (pGAN) [IJCAI 2018]☆17Oct 15, 2019Updated 6 years ago
- The code of "Adversarial Metric Attack for Person Re-identification"☆30Feb 8, 2019Updated 7 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago
- This is the repositoary for our paper published at ICML24.☆11Jun 11, 2025Updated 8 months ago
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 5 years ago
- Source code for paper "Adversary Guided Asymmetric Hashing for Cross-Modal Retrieval".☆39Sep 4, 2019Updated 6 years ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆39Aug 28, 2022Updated 3 years ago
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆18Jul 20, 2021Updated 4 years ago
- Metric Adversarial Attacks and Defense☆19Sep 28, 2021Updated 4 years ago
- CNN Image Retrieval in PyTorch: Training and evaluating CNNs for Image Retrieval in PyTorch☆1,490May 13, 2024Updated last year
- Joint-modal Distribution-based Similarity Hashing for Large-scale Unsupervised Deep Cross-modal Retrieval☆25Dec 10, 2020Updated 5 years ago
- Code and benchmarks for the Semantic Video Retrieval Task☆53Oct 18, 2022Updated 3 years ago
- Source code of our AAAI 2018 paper "Unsupervised Generative Adversarial Cross-modal Hashing"☆53Oct 3, 2019Updated 6 years ago
- ☆26Dec 23, 2021Updated 4 years ago
- This is a pytorch implementation of the CVPR2020 paper: Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-id…☆96Jun 4, 2021Updated 4 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 5 years ago
- Indent settings: alias lindent='indent -npro -kr -i8 -ts8 -sob -l80 -ss -ncs -cp1'☆33Jun 28, 2011Updated 14 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- The offical code for paper "Matching Images and Text with Multi-modal Tensor Fusion and Re-ranking", ACM Multimedia 2019 Oral☆68Sep 28, 2019Updated 6 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Dec 7, 2024Updated last year
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 6 years ago
- Source code for paper "Semantic Structure-based Unsupervised Deep Hashing" on IJCAI-2018☆30Aug 31, 2019Updated 6 years ago
- Matlab implementation of our works on online hashing☆24Sep 17, 2021Updated 4 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆36Mar 14, 2021Updated 4 years ago
- Adversarial Attack and Defense in Deep Ranking, T-PAMI, 2024☆23Feb 16, 2024Updated 2 years ago
- Polysemous Visual-Semantic Embedding for Cross-Modal Retrieval (CVPR 2019)☆134Mar 15, 2024Updated last year
- Deep Cross-Modal Projection Learning for Image-Text Matching☆77Sep 2, 2020Updated 5 years ago
- Adversarial training with PGD adversarial examples☆35Sep 18, 2019Updated 6 years ago