Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight
☆46Aug 12, 2023Updated 2 years ago
Alternatives and similar repositories for AT3D
Users that are interested in AT3D are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- ☆21Sep 23, 2025Updated 6 months ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆55Oct 14, 2024Updated last year
- Original PyTorch implementation of the AdversarialMask paper☆22Apr 16, 2023Updated 2 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆22Feb 23, 2024Updated 2 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆464Feb 27, 2026Updated 3 weeks ago
- code for paper "Physical-World Optical Adversarial Attacks on 3D Face Recognition"☆20Oct 19, 2023Updated 2 years ago
- The implementation of our NeurIPS 2024 paper "DarkSAM: Fooling Segment Anything Model to Segment Nothing".☆13Nov 4, 2024Updated last year
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- [ACM MM 2024] ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack☆14Dec 20, 2024Updated last year
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆260Nov 23, 2025Updated 4 months ago
- PDiff: Semantic-based Patch Presence Testing for Downstream Kernels☆14Nov 8, 2020Updated 5 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆95Dec 1, 2022Updated 3 years ago
- ☆14Jun 15, 2022Updated 3 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- MATLAB code for PRM and RRT algorithms in a 4-DOF 2-link arm environment. Visualize robot, check collisions, generate samples, construct …☆15Jul 4, 2023Updated 2 years ago
- Photometric optimization code for creating the FLAME texture space and other applications☆16Mar 3, 2021Updated 5 years ago
- Code for the NeurIPS 2019 submission: "Improving Black-box Adversarial Attacks with a Transfer-based Prior".☆16May 6, 2020Updated 5 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆116Jul 21, 2022Updated 3 years ago
- ☆109Feb 16, 2024Updated 2 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆141Sep 11, 2025Updated 6 months ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago
- ☆38Sep 14, 2024Updated last year
- Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Models☆269May 13, 2024Updated last year