winterwindwang / Full-coverage-camouflage-adversarial-attackView external linksLinks
https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/
☆19May 9, 2022Updated 3 years ago
Alternatives and similar repositories for Full-coverage-camouflage-adversarial-attack
Users that are interested in Full-coverage-camouflage-adversarial-attack are comparing it to the libraries listed below
Sorting:
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- A Paperlist of Adversarial Attack on Object Detection☆125Mar 16, 2023Updated 2 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Dec 8, 2022Updated 3 years ago
- object detection, adversarial robustness, ICIP2021☆17Jan 10, 2021Updated 5 years ago
- Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021☆19Dec 6, 2021Updated 4 years ago
- Code repo of our paper Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis (https://arxiv.org/abs/2406.10794…☆23Jul 26, 2024Updated last year
- https://arxiv.org/pdf/1906.11897.pdf☆23Oct 27, 2021Updated 4 years ago
- ☆71Mar 30, 2025Updated 10 months ago
- ☆23Sep 1, 2020Updated 5 years ago
- ☆27Oct 14, 2021Updated 4 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 3 years ago
- Adversarial Augmentation Against Adversarial Attacks☆32May 23, 2023Updated 2 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆33Mar 16, 2022Updated 3 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- ☆12May 6, 2022Updated 3 years ago
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆40Aug 6, 2024Updated last year
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- A voice spoofing detection system, based on paper presented at ICSPIS 2021☆10Feb 11, 2022Updated 4 years ago
- 七轴机械臂的仿真☆13Jun 7, 2022Updated 3 years ago
- ☆42Jan 25, 2024Updated 2 years ago
- Code for Geometry-Aware Generation of Adversarial Point Clouds☆35Jul 15, 2021Updated 4 years ago
- 使用open3d显示kitti数据的3D视角和BEV视角☆14Sep 26, 2022Updated 3 years ago
- Reimplementation the paper of Recurrent Convolutional Network for Video-based Person Re-Identification in Pytorch☆10Apr 9, 2019Updated 6 years ago
- ☆20Feb 3, 2025Updated last year
- Sketch Based Image Retrieval☆10Jul 13, 2018Updated 7 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆38Oct 7, 2025Updated 4 months ago
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆13Dec 16, 2024Updated last year
- ☆45Jun 11, 2023Updated 2 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆44Mar 24, 2023Updated 2 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- [TMLR'25] AutoTrust, a groundbreaking benchmark designed to assess the trustworthiness of DriveVLMs. This work aims to enhance public saf…☆52Nov 20, 2025Updated 2 months ago
- AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds (ECCV 2020)☆46Oct 19, 2020Updated 5 years ago
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆14Nov 3, 2024Updated last year
- a pytorch version of AdvGAN for cifar10 dataset☆10Dec 21, 2019Updated 6 years ago
- ☆15Oct 21, 2021Updated 4 years ago