[ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior
☆11Nov 7, 2020Updated 5 years ago
Alternatives and similar repositories for ME-Sampler
Users that are interested in ME-Sampler are comparing it to the libraries listed below
Sorting:
- Black-box Adversarial Attacks on Video Recognition Models. (VBAD)☆27Oct 28, 2019Updated 6 years ago
- ☆17Sep 23, 2022Updated 3 years ago
- ☆10Oct 18, 2021Updated 4 years ago
- Code and videos accompanying the paper "Flickering Adversarial Attacks against Video Recognition Networks"☆16Dec 8, 2022Updated 3 years ago
- Cross-Modal Transferable Adversarial Attacks from Images to Videos (CVPR 2022)☆21Jul 3, 2024Updated last year
- Tensorflow code for Sparse Adversarial Perturbations for Videos☆23Mar 8, 2019Updated 7 years ago
- One Model to Edit Them All: Free-Form Text-Driven Image Manipulation with Semantic Modulations. NeurIPS2022.☆34Feb 13, 2023Updated 3 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- [CVPR 2022 oral] Subspace Adversarial Training☆28Apr 27, 2023Updated 2 years ago
- Towards Deep Learning Models Resistant to Adversarial Attacks论文复现☆15Aug 18, 2021Updated 4 years ago
- [ICCV 2025] Official Implementation of Steering Rectified Flow Models in the Vector Field for Controlled Image Generation☆45Jun 27, 2025Updated 8 months ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- watermark video delogo☆11Nov 27, 2020Updated 5 years ago
- ☆53May 24, 2023Updated 2 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- Referring expression comprehension on ReferIt(RefClef)☆10Nov 28, 2016Updated 9 years ago
- ☆13Apr 27, 2020Updated 5 years ago
- Pytorch reimplementation of "One pixel attack for fooling deep neural networks"☆87Mar 13, 2018Updated 8 years ago
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 11 months ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- [ECCV 2024] Towards Reliable Evaluation and Fast Training of Robust Semantic Segmentation Models☆21Jul 17, 2024Updated last year
- Pytorch - Adversarial Training☆26May 9, 2018Updated 7 years ago
- [AAAI-25]Code for SEAL☆15Sep 25, 2025Updated 5 months ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Progressive Attention Networks☆12Oct 25, 2016Updated 9 years ago
- DeepSAVA: Sparse Adversarial Video Attacks with Spatial Transformations - BMVC 2021 & Neural Networks (2023)☆11Dec 13, 2024Updated last year
- Some projects from Xuanyi Dong.☆90Jul 9, 2025Updated 8 months ago
- A library for multi-task learning and meta-learning.☆12Feb 7, 2022Updated 4 years ago
- ☆15Dec 9, 2024Updated last year
- Eurosys22' - Rolis: a software approach to efficiently replicating multi-core transactions☆17Feb 28, 2024Updated 2 years ago
- Violet: Selective Symbolic Execution to Detect Bad Performance Misconfiguration☆17Oct 16, 2020Updated 5 years ago
- ☆19Jul 21, 2019Updated 6 years ago
- an efficient method for detecting adversarial image examples☆17Jun 3, 2018Updated 7 years ago
- Static security for database-backed Haskell applications using Liquid Haskell☆18May 29, 2024Updated last year
- ☆11Oct 13, 2024Updated last year
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago
- Learning about objects and their properties by interacting with them☆12Oct 21, 2020Updated 5 years ago