Defending Against Physically Realizable Attacks on Image Classification
☆34Jun 17, 2022Updated 3 years ago
Alternatives and similar repositories for phattacks
Users that are interested in phattacks are comparing it to the libraries listed below
Sorting:
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆34Sep 18, 2020Updated 5 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated last year
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆93Mar 24, 2023Updated 2 years ago
- ☆14Jul 25, 2020Updated 5 years ago
- ☆15Dec 18, 2021Updated 4 years ago
- ☆16Mar 24, 2023Updated 2 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- Code for the paper "(De)Randomized Smoothing for Certifiable Defense against Patch Attacks" by Alexander Levine and Soheil Feizi.☆17Aug 22, 2022Updated 3 years ago
- ☆20May 22, 2023Updated 2 years ago
- ☆22Sep 20, 2022Updated 3 years ago
- Source code of "Hold me tight! Influence of discriminative features on deep network boundaries"☆21Dec 10, 2021Updated 4 years ago
- Codebase for "Exploring the Landscape of Spatial Robustness" (ICML'19, https://arxiv.org/abs/1712.02779).☆25Sep 16, 2019Updated 6 years ago
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆100Jun 30, 2025Updated 8 months ago
- AISG Trusted Media Challenge Submission Guide: This repository serves as a step by step guide to help participants with creating a valid …☆17Jul 14, 2021Updated 4 years ago
- A PyTorch Implementation of the UAP attack☆19Dec 31, 2018Updated 7 years ago
- Reproduce multiple adversarial attack methods☆21May 5, 2020Updated 5 years ago
- ☆23Aug 24, 2020Updated 5 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆142Aug 23, 2023Updated 2 years ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆22Sep 6, 2021Updated 4 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Jun 30, 2020Updated 5 years ago
- Code for Adversarial Example Games NeurIPS 2020 Paper☆27Nov 27, 2024Updated last year
- Solution to Deepfake Detection Challenge☆27Jun 22, 2022Updated 3 years ago
- ☆62Aug 31, 2021Updated 4 years ago
- Pytorch implementation of Adversarial Patch on ImageNet (arXiv: https://arxiv.org/abs/1712.09665)☆63Mar 22, 2020Updated 5 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Dec 31, 2024Updated last year
- ☆30Apr 17, 2024Updated last year
- OpenForensics Dataset☆28Oct 21, 2022Updated 3 years ago
- Code for paper "PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking"☆73Jul 13, 2022Updated 3 years ago
- Code of Feature Completion for Occluded Person Re-Identification (TPAMI 2021).☆34Sep 22, 2021Updated 4 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Mar 28, 2020Updated 5 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 2 years ago
- [ICML 2021] DFAC Framework: Factorizing the Value Function via Quantile Mixture for Multi-Agent Distributional Q-Learning☆32Jun 1, 2023Updated 2 years ago
- ☆37Jul 3, 2024Updated last year
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- Source code for the paper "Memory-Efficient Fine-Tuning via Low-Rank Activation Compression"☆13Aug 1, 2025Updated 7 months ago
- Steps towards physical adversarial attacks on facial recognition☆83Oct 3, 2023Updated 2 years ago