pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain
☆11Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for SID
Users that are interested in SID are comparing it to the libraries listed below
Sorting:
- ☆21Nov 30, 2022Updated 3 years ago
- ☆22Dec 1, 2022Updated 3 years ago
- ☆23Mar 19, 2024Updated last year
- DSBA code study☆30Nov 7, 2023Updated 2 years ago
- huggingface transformers tutorial, code, resources☆26Apr 7, 2024Updated last year
- ☆29Dec 1, 2022Updated 3 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- ☆30Dec 1, 2022Updated 3 years ago
- "CS224n 2021 winter" study - KoreaUniv. DSBA Lab☆15Apr 18, 2022Updated 3 years ago
- ☆19Nov 26, 2023Updated 2 years ago
- ☆22Nov 23, 2023Updated 2 years ago
- ☆25Nov 24, 2023Updated 2 years ago
- ☆44Aug 22, 2022Updated 3 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆33Mar 16, 2022Updated 3 years ago
- Type-Specific Adversarial Attack for Object Detection☆13Aug 27, 2021Updated 4 years ago
- Adversarial Examples Detection Benchmark☆17Dec 6, 2024Updated last year
- an efficient method for detecting adversarial image examples☆18Jun 3, 2018Updated 7 years ago
- Generic Event Boundary Captioning (GEBC) Challenge at LOVEU@CVPR 2022 - 3rd place (REVECA)☆25Feb 17, 2023Updated 3 years ago
- Time-series-LLM☆23Oct 31, 2023Updated 2 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- ☆29Jan 16, 2023Updated 3 years ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Feb 11, 2026Updated 2 weeks ago
- ☆12May 6, 2022Updated 3 years ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- ☆33Feb 11, 2023Updated 3 years ago
- ☆11Oct 30, 2024Updated last year
- ☆12Dec 9, 2022Updated 3 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- read and write operations across cloud providers☆11Apr 23, 2019Updated 6 years ago
- 2024届求职-C++后端-学习笔记-操作系统、计算机网络、C++语言+算法☆13Oct 31, 2023Updated 2 years ago
- ☆10May 19, 2024Updated last year
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- ☆11Dec 9, 2018Updated 7 years ago
- This is code for the EMNLP 2022 Paper "UniRPG: Unified Discrete Reasoning over Table and Text as Program Generation".☆10Apr 30, 2023Updated 2 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 2 months ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- springboot auto xss☆11May 23, 2018Updated 7 years ago
- [AAAI 24] GradTree: Gradient-Based Axis-Aligned Decision Trees☆15Aug 28, 2024Updated last year