A notebook for recording my research.
☆19Oct 25, 2024Updated last year
Alternatives and similar repositories for notebook
Users that are interested in notebook are comparing it to the libraries listed below
Sorting:
- ☆16Aug 13, 2024Updated last year
- Official Pytorch implementation for our ACM MM 2023 paper: Moiré Backdoor Attack (MBA): A Novel Trigger for Pedestrian Detectors in the P…☆16Jan 22, 2024Updated 2 years ago
- Official implementation of Segmentation and Complete (SAC) defense.☆26Nov 13, 2023Updated 2 years ago
- ☆23Jun 25, 2023Updated 2 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- [TGRS🔥] Towards Generic and Controllable Attacks Against Object Detection☆37Nov 5, 2023Updated 2 years ago
- ☆37Sep 14, 2024Updated last year
- ☆33Sep 9, 2020Updated 5 years ago
- ☆38Jul 13, 2020Updated 5 years ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ☆11Jan 24, 2024Updated 2 years ago
- Simple Serial Port Tool Based on pyqt6,基于 pyqt6 的简单串口工具☆10May 11, 2024Updated last year
- Awesome-Adversarial-Attack-Methods-Summary☆12Jul 24, 2024Updated last year
- PyTorch implementation of satellite image pose estimation using ResNet model architecture.☆10Dec 8, 2023Updated 2 years ago
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆44Oct 12, 2023Updated 2 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆116Oct 11, 2024Updated last year
- Paper sharing in adversary related works☆46Aug 14, 2025Updated 6 months ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- AdvT-shirt-1K A Physical-world Adversarial T-shirt Dataset for Adversarial Robustness Evaluation☆14Aug 7, 2025Updated 6 months ago
- ☆10Apr 19, 2022Updated 3 years ago
- my attempt at implementing the DiffEdit paper (WIP)☆16Oct 30, 2022Updated 3 years ago
- Pytorch plugin to generate saliency maps for neural networks☆12Nov 1, 2018Updated 7 years ago
- ☆13Jul 5, 2024Updated last year
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆15Feb 12, 2025Updated last year
- 😎 A curated list of awesome real-world adversarial examples resources☆62Jul 29, 2020Updated 5 years ago
- [Aerospace 2022] Learning-Based Pose Estimation of Non-Cooperative Spacecrafts with Uncertainty Prediction☆17Apr 7, 2024Updated last year
- ☆62Aug 31, 2021Updated 4 years ago
- a simple implementation of part-of-speech tagging with hmm☆13Feb 26, 2019Updated 7 years ago
- [ECCV 2022: Oral] In this work, we discover that color is a crtical transferable forensic feature (T-FF) in universal detectors for detec…☆16Jan 25, 2023Updated 3 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models☆20Nov 8, 2025Updated 3 months ago
- ☆14Jul 25, 2020Updated 5 years ago