The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]
☆32Jun 9, 2020Updated 5 years ago
Alternatives and similar repositories for UAP_retrieval
Users that are interested in UAP_retrieval are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Jun 7, 2021Updated 4 years ago
- ☆15Mar 20, 2020Updated 6 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- Code for AAAI 2021 paper ``MetaAttack"☆26Jun 10, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Repository for the paper "Data Efficient Masked Language Modeling for Vision and Language".☆18Sep 17, 2021Updated 4 years ago
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆46Apr 16, 2019Updated 7 years ago
- Adversarial queries for blocking Content-based Image Retrieval (CBIR)☆14May 3, 2019Updated 7 years ago
- The code of "Adversarial Metric Attack for Person Re-identification"☆30Feb 8, 2019Updated 7 years ago
- CNN Image Retrieval in PyTorch: Training and evaluating CNNs for Image Retrieval in PyTorch☆1,494May 13, 2024Updated 2 years ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆40Aug 28, 2022Updated 3 years ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆68Mar 20, 2023Updated 3 years ago
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 6 years ago
- ☆26Dec 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Metric Adversarial Attacks and Defense☆19Sep 28, 2021Updated 4 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 6 years ago
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆19Jul 20, 2021Updated 4 years ago
- This is a pytorch implementation of the CVPR2020 paper: Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-id…☆97Jun 4, 2021Updated 4 years ago
- Source code for paper "Adversary Guided Asymmetric Hashing for Cross-Modal Retrieval".☆40Sep 4, 2019Updated 6 years ago
- The code of paper: Robust Face Sketch Synthesis via Generative Adversarial Fusion of Priors and Parametric Sigmoid (pGAN) [IJCAI 2018]☆17Oct 15, 2019Updated 6 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 6 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- This is an official implementation of our CVPR 2020 paper "Non-Local Neural Networks With Grouped Bilinear Attentional Transforms".☆13Jan 30, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Published in CVPR 2020; matlab codes☆22Sep 15, 2024Updated last year
- Universal Adversarial Perturbations based on the (p, q)-singular vectors.☆12Jan 8, 2018Updated 8 years ago
- Code and benchmarks for the Semantic Video Retrieval Task☆53Oct 18, 2022Updated 3 years ago
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆28Jul 18, 2023Updated 2 years ago
- 厦门大学研究生学位论文 LaTeX 模板☆27May 28, 2021Updated 4 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- Source code for paper "Semantic Structure-based Unsupervised Deep Hashing" on IJCAI-2018☆30Aug 31, 2019Updated 6 years ago
- Joint-modal Distribution-based Similarity Hashing for Large-scale Unsupervised Deep Cross-modal Retrieval☆25Dec 10, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆25Apr 7, 2025Updated last year
- ☆10Mar 6, 2020Updated 6 years ago
- Discord爬 蟲,把Discord頻道所有內容全部抓下來儲存☆12Jan 31, 2021Updated 5 years ago
- The offical code for paper "Matching Images and Text with Multi-modal Tensor Fusion and Re-ranking", ACM Multimedia 2019 Oral☆68Sep 28, 2019Updated 6 years ago
- ☆11Mar 11, 2025Updated last year
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- Matlab implementation of our works on online hashing☆24Sep 17, 2021Updated 4 years ago