☆18Mar 24, 2023Updated 2 years ago
Alternatives and similar repositories for scaling_camouflage
Users that are interested in scaling_camouflage are comparing it to the libraries listed below
Sorting:
- This is the repositoary for our paper published at ICML24.☆11Jun 11, 2025Updated 8 months ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- A large-scale evaluation benchmark called DeepFaceGen, aimed at quantitatively assessing the effectiveness of face forgery detection and …☆25May 31, 2025Updated 9 months ago
- Implementation of the Biased Boundary Attack for ImageNet☆22Aug 18, 2019Updated 6 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆36Mar 14, 2021Updated 4 years ago
- A Snippet generator for opencv.☆10Mar 2, 2024Updated 2 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- Building a model for predicting whether a student will be admitted to college. Done as a part of Project of the Week at DataTalks.Club☆11Aug 15, 2022Updated 3 years ago
- ☆19Feb 12, 2025Updated last year
- Accompanying source code to my Bachelor's thesis at TUHH☆11Mar 15, 2018Updated 7 years ago
- ADNet Implementation using Tensorflow☆10Mar 28, 2020Updated 5 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- ☆12Jan 25, 2025Updated last year
- ☆12May 16, 2024Updated last year
- [CVPR2020] Clean-Label Backdoor Attacks on Video Recognition Models☆42Jun 19, 2020Updated 5 years ago
- 🍅 移动端部署,支持YOLOv5s、YOLOv4-tiny、MobileNetV2-YOLOv3-nano、Simple-Pose与Yolact模型,支持iOS、Android,使用NCNN框架。☆12Aug 20, 2020Updated 5 years ago
- Port of YOLOv4 to C# + TensorFlow☆12Dec 29, 2020Updated 5 years ago
- A PyTorch implementation of NormSoftmax based on BMVC 2019 paper "Classification is a Strong Baseline for Deep Metric Learning"☆10Mar 15, 2020Updated 5 years ago
- Automatic identification of regions in the latent space of a model that correspond to unique concepts, namely to concepts with a semantic…☆14Nov 22, 2023Updated 2 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- ☆13Feb 2, 2022Updated 4 years ago
- otSlider (OneTime Slider) is a powerful and intuitive slider built from plain/vanilla Javascript, which is suitable for any kind of Web A…☆11Nov 17, 2024Updated last year
- Ultralytics pre-commit hooks☆50May 11, 2025Updated 9 months ago
- ☆12Mar 2, 2022Updated 4 years ago
- Adversarial Item Promotion in visually-aware recommenders☆16Sep 3, 2021Updated 4 years ago
- ai grand challenge / track 01 / activity detection☆11Apr 7, 2021Updated 4 years ago
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 5 months ago
- Noise2Noise: Learning Image Restoration without Clean Data☆14Feb 22, 2020Updated 6 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Utilities for working with videos☆13Jul 5, 2025Updated 8 months ago
- A simple Python app for the Python Language Guide in Docker's Docs☆17May 6, 2024Updated last year
- List of papers on cryptography assisted deep learning privacy computation☆17Dec 29, 2025Updated 2 months ago
- Official repository for the paper "Gradient-based Jailbreak Images for Multimodal Fusion Models" (https//arxiv.org/abs/2410.03489)☆19Oct 22, 2024Updated last year
- 😎 A curated list of awesome real-world adversarial examples resources☆62Jul 29, 2020Updated 5 years ago
- A complete app leveraging Tensorflow.JS and React for real time object detection.☆16Nov 17, 2020Updated 5 years ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆20Feb 20, 2026Updated 2 weeks ago
- Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inferen…☆15Nov 21, 2022Updated 3 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 2 years ago
- CSC420 Fall 2019 Project☆19Apr 3, 2020Updated 5 years ago