☆17Sep 23, 2022Updated 3 years ago
Alternatives and similar repositories for TT
Users that are interested in TT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cross-Modal Transferable Adversarial Attacks from Images to Videos (CVPR 2022)☆21Jul 3, 2024Updated last year
- ☆37Jul 3, 2024Updated last year
- Code for the AAAI 2023 paper: "Global-Local Characteristic Excited Cross-Modal Attacks from Images to Video" (accepted).☆14Feb 25, 2024Updated 2 years ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- Black-box Adversarial Attacks on Video Recognition Models. (VBAD)☆27Oct 28, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- [ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos☆12Mar 29, 2024Updated last year
- Code and videos accompanying the paper "Flickering Adversarial Attacks against Video Recognition Networks"☆16Dec 8, 2022Updated 3 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- This repository is used for sharing the source code of Double low-rank representation with projection distance penalty for clustering☆12Jan 26, 2022Updated 4 years ago
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆30Nov 15, 2025Updated 4 months ago
- [CVPR 2022 oral] Subspace Adversarial Training☆28Apr 27, 2023Updated 2 years ago
- ☆14Dec 18, 2024Updated last year
- Towards Deep Learning Models Resistant to Adversarial Attacks论文复现☆15Aug 18, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Adversarial Distributional Training (NeurIPS 2020)☆63Mar 17, 2021Updated 5 years ago
- Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020)☆10Jan 5, 2022Updated 4 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆13Feb 28, 2024Updated 2 years ago
- A "gym" style toolkit for building lightweight NAS systems.☆13Jun 13, 2022Updated 3 years ago
- A PyTorch implementation of D-RISE☆38Jun 26, 2021Updated 4 years ago
- COLING'24 Humanizing Machine-Generated Content: Evading AI-Text Detection through Adversarial Attack☆59Apr 10, 2024Updated last year
- ☆21Sep 23, 2025Updated 6 months ago
- Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021☆19Dec 6, 2021Updated 4 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- watermark video delogo☆11Nov 27, 2020Updated 5 years ago
- Developing adversarial examples and showing their semantic generalization for the OpenAI CLIP model (https://github.com/openai/CLIP)☆26Mar 6, 2021Updated 5 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Implementation for <Robust Weight Perturbation for Adversarial Training> in IJCAI'22.☆16Jul 1, 2022Updated 3 years ago
- ☆20Jan 15, 2024Updated 2 years ago
- [ECCV 2024] Towards Reliable Evaluation and Fast Training of Robust Semantic Segmentation Models☆21Jul 17, 2024Updated last year
- Start from Interpret Neural Networks by Identifying Critical Data Routing Paths☆14Jan 24, 2019Updated 7 years ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆72Sep 6, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- [AAAI-25]Code for SEAL☆15Sep 25, 2025Updated 6 months ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago
- code for our BMVC 2021 paper "HCV: Hierarchy-Consistency Verification for Incremental Implicitly-Refined Classification"☆15Oct 28, 2022Updated 3 years ago
- Unsupervised Vehicle Re-Identification via Self-Supervised Metric Learning using Feature Dictionary☆11Jul 30, 2021Updated 4 years ago
- update code for pytorch1.4☆11Aug 12, 2021Updated 4 years ago
- A library for multi-task learning and meta-learning.☆12Feb 7, 2022Updated 4 years ago