☆10Apr 6, 2024Updated last year
Alternatives and similar repositories for Data-efficient-UAP
Users that are interested in Data-efficient-UAP are comparing it to the libraries listed below
Sorting:
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- ☆23Apr 7, 2025Updated 10 months ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Aug 17, 2023Updated 2 years ago
- The proliferation of fake news on social media sites is a serious problem with documented negative impacts on individuals and organizatio…☆12Oct 24, 2020Updated 5 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- ☆15Oct 21, 2021Updated 4 years ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- The implementation of our NeurIPS 2024 paper "DarkSAM: Fooling Segment Anything Model to Segment Nothing".☆13Nov 4, 2024Updated last year
- Demo code for the paper: One Thing to Fool them All: Generating Interpretable, Universal, and Physically-Realizable Adversarial Features☆12Nov 30, 2023Updated 2 years ago
- ☆15Apr 7, 2023Updated 2 years ago
- Code for Visual Information Hiding Based on Obfuscating Adversarial Perturbations☆13Jan 9, 2024Updated 2 years ago
- We present **FOCI**, a benchmark for Fine-grained Object ClassIfication for large vision language models (LVLMs).☆19Jun 21, 2024Updated last year
- Code for our NeurIPS 2023 paper Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly☆14Jan 22, 2024Updated 2 years ago
- ☆12Oct 22, 2024Updated last year
- [IEEE VR'22] SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image Classifiers☆12Jun 21, 2025Updated 8 months ago
- ☆16Dec 18, 2023Updated 2 years ago
- 毕设 实验☆11Jan 2, 2019Updated 7 years ago
- IVA-Xception model which can achieve high performance in identifying multiple birds from overlapping bird sounds recordings based on IVA …☆16Oct 20, 2021Updated 4 years ago
- [ECCV2020] Robust Tracking against Adversarial Attacks☆16Sep 9, 2021Updated 4 years ago
- A P2P chat application client suitable for local area network(LAN)(Windows) developed using Qt5 and C++.☆14Jan 14, 2022Updated 4 years ago
- Adversarial Detection v.s. Object Detection.☆14Jul 29, 2023Updated 2 years ago
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆53Mar 3, 2022Updated 3 years ago
- Data-Independent Operator: A Training-Free Artifact Representation Extractor for Generalizable Deepfake Detection☆17Mar 19, 2024Updated last year
- (AAAI 2024) Transferable Adversarial Attacks for Object Detection using Object-Aware Significant Feature Distortion☆16Dec 13, 2023Updated 2 years ago
- This is a toolKit/template project for web application/server with Gin, packed common services.☆17Jan 7, 2022Updated 4 years ago
- GCNs Analysis: Visualization, Error Cases etc.☆14Feb 15, 2023Updated 3 years ago
- A tool to explore/extract Ace Combat 4/5/0's files.☆12Apr 23, 2022Updated 3 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 7 months ago
- The official implementation of NeurIPS 2021 paper: Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks☆17Jul 4, 2023Updated 2 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- Official implementation of "Can You Spot the Chameleon? Adversarially Camouflaging Images from Co-Salient Object Detection" in CVPR 2022.☆19Mar 28, 2022Updated 3 years ago
- ☆20Aug 7, 2023Updated 2 years ago
- ☆14Jul 25, 2020Updated 5 years ago