Original PyTorch implementation of the AdversarialMask paper
☆22Apr 16, 2023Updated 2 years ago
Alternatives and similar repositories for AdversarialMask
Users that are interested in AdversarialMask are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31Jun 22, 2021Updated 4 years ago
- Your Ledger companion.☆33Aug 19, 2024Updated last year
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- ☆23Sep 1, 2020Updated 5 years ago
- Data from Legal Aid Society's Law Enforcement Lookup☆12Mar 16, 2026Updated last week
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- Implementation of adversarial training under fast-gradient sign method (FGSM), projected gradient descent (PGD) and CW using Wide-ResNet-…☆40May 15, 2020Updated 5 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Automated neural architecture search algorithms implemented in PyTorch and Autogluon toolkit.☆12Apr 17, 2020Updated 5 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago
- Python 3.6+ module to make Flask compatible with AWS Lambda☆10Jul 5, 2023Updated 2 years ago
- ☆12Sep 14, 2021Updated 4 years ago
- ☆18Nov 3, 2022Updated 3 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- PyTorch3D is FAIR's library of reusable components for deep learning with 3D data☆10Jun 22, 2023Updated 2 years ago
- Turn your images into beautiful "Emoji Mosaics".☆11Jul 6, 2017Updated 8 years ago
- read and write operations across cloud providers☆11Apr 23, 2019Updated 6 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 3 years ago
- ☆17Sep 17, 2020Updated 5 years ago
- A very limited implementation of arXiv:1904.00759☆13Dec 2, 2019Updated 6 years ago
- Doom for Apple A/UX (based on Doom 1.10)☆15Jun 18, 2022Updated 3 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- Label your dataset with active learning in FiftyOne!☆18Apr 4, 2024Updated last year
- 一个用tikz绘制多维评价雷达图的自定义环境,以便于在LaTeX绘制多维评价雷达图。☆12Jan 5, 2019Updated 7 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 8 months ago
- ☆17Jul 15, 2022Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆19Jul 5, 2022Updated 3 years ago
- The wallet with maximum privacy and security☆115Dec 21, 2025Updated 3 months ago
- Bash script to automatically generate Python lambda functions able to run Selenium and Headless Chrome☆10Mar 15, 2022Updated 4 years ago
- ☆19Apr 27, 2022Updated 3 years ago
- UAV Search And Rescue in Airsim Simulation with Yolov5 Models☆16Oct 12, 2024Updated last year
- Internet Pack☆22Mar 13, 2026Updated last week
- AT Protocol IPLD-CAR Repository toolkit (CLI)☆10Oct 25, 2025Updated 4 months ago
- ❤️ Streaming torrent app for Mac, Windows, and Linux with enhanced privacy☆11Mar 12, 2023Updated 3 years ago
- Source for AT&T UNIX System V/386 Release 4 Version 3.0☆17Aug 19, 2024Updated last year
- JavaScript AST interpreter for sandboxed execution☆27Oct 5, 2025Updated 5 months ago