Robust Adversarial Perturbation on Deep Proposal-based Models
☆25Jul 15, 2022Updated 3 years ago
Alternatives and similar repositories for BMVC2018R-AP
Users that are interested in BMVC2018R-AP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆52Feb 27, 2021Updated 5 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- An adversarial attack on object detectors☆149Oct 12, 2021Updated 4 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆133Apr 4, 2023Updated 2 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆126Jan 30, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51May 9, 2025Updated 10 months ago
- Implementation of AAAI 2022 Paper: Context-Aware Transfer Attacks for Object Detection☆20Feb 28, 2022Updated 4 years ago
- Adversarial attack to detectors☆46Oct 23, 2021Updated 4 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Dec 15, 2023Updated 2 years ago
- Tensorflow code for Sparse Adversarial Perturbations for Videos☆23Mar 8, 2019Updated 7 years ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- (AAAI 2024) Transferable Adversarial Attacks for Object Detection using Object-Aware Significant Feature Distortion☆16Dec 13, 2023Updated 2 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Grid Patch Attack for Object Detection☆43Mar 31, 2022Updated 3 years ago
- [NeurIPS 2022] GAMA: Generative Adversarial Multi-Object Scene Attacks☆19Sep 5, 2023Updated 2 years ago
- ☆44May 8, 2020Updated 5 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- A Paperlist of Adversarial Attack on Object Detection☆124Mar 16, 2023Updated 3 years ago
- 面向目标检测的对抗样本攻击☆25Mar 17, 2021Updated 5 years ago
- Track hijacking attack against Multiple-Object Tracking☆45Aug 27, 2019Updated 6 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆38Jul 13, 2020Updated 5 years ago
- Adversarial Texture for Fooling Person Detectors in the Physical World☆62Oct 20, 2024Updated last year
- ☆22Dec 12, 2022Updated 3 years ago
- Tensorflow implementation of Our APE-GAN☆23Apr 24, 2018Updated 7 years ago
- [TGRS🔥] Towards Generic and Controllable Attacks Against Object Detection☆37Nov 5, 2023Updated 2 years ago
- Code for the AAAI 2024 paper: "AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack" (accepted).☆12Mar 28, 2024Updated last year
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆33May 24, 2018Updated 7 years ago
- ☆38Sep 14, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 3 years ago
- ☆16Mar 24, 2025Updated last year
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks☆46Feb 24, 2022Updated 4 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago