Original PyTorch implementation of the AdversarialMask paper
☆23Apr 16, 2023Updated 3 years ago
Alternatives and similar repositories for AdversarialMask
Users that are interested in AdversarialMask are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- Data from Legal Aid Society's Law Enforcement Lookup☆11Apr 24, 2026Updated last week
- ☆23Sep 1, 2020Updated 5 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ICCV 2021☆34Oct 6, 2021Updated 4 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- ☆11Jan 4, 2022Updated 4 years ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Aug 3, 2022Updated 3 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆50Jul 6, 2022Updated 3 years ago
- Implementation of adversarial training under fast-gradient sign method (FGSM), projected gradient descent (PGD) and CW using Wide-ResNet-…☆40May 15, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12Sep 22, 2023Updated 2 years ago
- ☆20Mar 14, 2022Updated 4 years ago
- Automated neural architecture search algorithms implemented in PyTorch and Autogluon toolkit.☆12Apr 17, 2020Updated 6 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago
- Python 3.6+ module to make Flask compatible with AWS Lambda☆10Jul 5, 2023Updated 2 years ago
- Protest organizing application☆67Oct 18, 2019Updated 6 years ago
- some baseline attack method by pytorch☆11Oct 13, 2021Updated 4 years ago
- ☆10Aug 24, 2022Updated 3 years ago
- Tools and documentation for NNCP☆16Feb 4, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Anonymized code for Igeood: An Information Geometry Approach to Out-of-Distribution Detection☆12Jan 25, 2022Updated 4 years ago
- ☆12Sep 14, 2021Updated 4 years ago
- ⬇️ PyScaffold extension which replaces reStructuredText by Markdown☆14Updated this week
- ☆18Nov 3, 2022Updated 3 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- A pytorch implementation of the AAAI2021 paper GraCapsNet: Interpretable Graph Capsule Networks for Object Recognition☆10Oct 2, 2022Updated 3 years ago
- PyTorch3D is FAIR's library of reusable components for deep learning with 3D data☆10Jun 22, 2023Updated 2 years ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- Turn your images into beautiful "Emoji Mosaics".☆10Jul 6, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Nov 15, 2021Updated 4 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 3 years ago
- CTF challenge and Writeup☆13Apr 11, 2019Updated 7 years ago
- Example code of [Tianchi AAAI2022 Security AI Challenger Program Phase 8]☆22Feb 9, 2022Updated 4 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- A paper list for localized adversarial patch research☆163Jul 28, 2025Updated 9 months ago