Steps towards physical adversarial attacks on facial recognition
☆83Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for FaceOff
Users that are interested in FaceOff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- This repo is for ChaLearn Face Anti-spoofing Attack Detection Challenge@CVPR2019☆10Dec 3, 2019Updated 6 years ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Aug 3, 2022Updated 3 years ago
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- Browser based rce for iOS <= 14.3☆10May 26, 2025Updated 9 months ago
- Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》☆30Nov 6, 2019Updated 6 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆337Feb 18, 2021Updated 5 years ago
- baichuan SDK 5.4.x逆向☆10Sep 27, 2020Updated 5 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- An application for comparing two binary files☆11Feb 22, 2019Updated 7 years ago
- Various projects aiming at unlocking and programming the MINI54ZAN microcontroller☆17Sep 30, 2020Updated 5 years ago
- Multiplayer snake game written at a single weekend☆13Jul 10, 2019Updated 6 years ago
- ☆17Feb 25, 2019Updated 7 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Feb 15, 2022Updated 4 years ago
- Cross Platform Hook Library based on Detours☆33Oct 11, 2024Updated last year
- ☆43Jul 27, 2021Updated 4 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆16Dec 8, 2022Updated 3 years ago
- Raspberry Pi heavy load power supply testing☆12Apr 27, 2018Updated 7 years ago
- Mirror my talk materials☆47Oct 16, 2025Updated 5 months ago
- WIP Custom ARM UEFI firmware for Lumia535☆10Mar 28, 2020Updated 5 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- For RaspberryPi4 support, use upstream directly. Everything was merged there already. "Das U-Boot" Source Tree☆11Jul 24, 2019Updated 6 years ago
- Removing Adversarial Noise in Class Activation Feature Space☆14Oct 12, 2023Updated 2 years ago
- ☆12Aug 31, 2022Updated 3 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- A partially working linux kernel for nokia msm8974 devices☆12Mar 11, 2020Updated 6 years ago
- ☆11Jan 2, 2020Updated 6 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago
- Turn any Windows precision touchpad into a touchscreen.☆12Oct 21, 2018Updated 7 years ago
- ☆15Nov 8, 2019Updated 6 years ago
- Open Source overclocking for nvidia cards taken from https://1vwjbxf1wko0yhnr.wordpress.com/author/2pkaqwtuqm2q7djg/☆16Aug 11, 2015Updated 10 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆35Mar 29, 2023Updated 2 years ago
- Fast and unlimited premium link generator Vinaget☆10Nov 1, 2013Updated 12 years ago