zhiyugege / FreqBiasView external linksLinks
☆16Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for FreqBias
Users that are interested in FreqBias are comparing it to the libraries listed below
Sorting:
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- A modular framework designed for easy experimentation with optimization-based diffusion sampling algorithms.☆17Apr 9, 2025Updated 10 months ago
- ☆15Dec 19, 2022Updated 3 years ago
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆20Jul 30, 2024Updated last year
- ☆30May 1, 2025Updated 9 months ago
- We propose a statistical consistency attack (StatAttack) against diverse DeepFake detectors.☆18Aug 16, 2023Updated 2 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Corresponding Code to the Paper "Fake or JPEG? Revealing Common Biases in Generated Image Detection Datasets"☆27Sep 11, 2024Updated last year
- [CVPR'25] CO-SPY: Combining Semantic and Pixel Features to Detect Synthetic Images by AI☆37Jan 8, 2026Updated last month
- Respect to the input tensor instead of paramters of NN☆21Jul 18, 2022Updated 3 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆115Jul 21, 2022Updated 3 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- ☆11Dec 23, 2024Updated last year
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 3 years ago
- Code accompanying the NeurIPS 2020 submission "Teaching a GAN What Not to Learn."☆32Sep 3, 2021Updated 4 years ago
- Pierson Moskowitz and JONSWAP Sea Spectrum and sample waves☆13Jul 16, 2020Updated 5 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Dec 9, 2024Updated last year
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆12Jul 17, 2024Updated last year
- This is a classification task based on CIFAR10,Accuracy is about 87%(without pre-training),The net is CoAtNet(0-5,total coatnet family),w…☆10Oct 1, 2023Updated 2 years ago
- ☆35Dec 9, 2020Updated 5 years ago
- Vision Transformer (ViT) models, with their attention mechanisms, revolutionized computer vision. By merging Class Activation Map (CAM) a…☆13Aug 14, 2023Updated 2 years ago
- pFedDef: Defending Grey-Box Attacks for Personalized Federated Learning☆10May 31, 2023Updated 2 years ago
- ☆36May 29, 2024Updated last year
- Implementation of paper "Leveraging Representations from Intermediate Encoder-blocks for Synthetic Image Detection"☆43Nov 5, 2024Updated last year
- Learn from amazing Kagglers on Kaggle☆12Feb 26, 2023Updated 2 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- This repos provides an MATLAB code implementation for the Statistical Approach to Texture Classification from Single Images paper by Varm…☆12Jan 30, 2018Updated 8 years ago
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- ☆11Feb 22, 2024Updated last year
- [ECAI] DA-Mamba: Domain Adaptive Hybrid Mamba-Transformer Based One-Stage Object Detection☆15May 6, 2025Updated 9 months ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- An Open Source implementation of Notebook LM.☆28Updated this week
- Continual learning strategies(EWC, GEM) for rotated MNIST dataset☆12Apr 6, 2020Updated 5 years ago
- Code for the paper on t-SNE with variable degree of freedom☆12Jun 27, 2019Updated 6 years ago
- Image manipulation detection☆12Feb 10, 2022Updated 4 years ago