Testing the effectiveness of practical implementations of adversarial examples against facial recognition.
☆138Feb 18, 2025Updated last year
Alternatives and similar repositories for Adversarial-Faces
Users that are interested in Adversarial-Faces are comparing it to the libraries listed below
Sorting:
- This repository is a curated list of papers and open source code about competition for CV Adversarial Attack.☆27Jan 9, 2023Updated 3 years ago
- utility to transform hast to a DOM tree☆20Feb 19, 2025Updated last year
- Colab "Jukebox: A Generative Model for Music"☆16Jun 14, 2020Updated 5 years ago
- Shows how to create basic image adversaries, and train adversarially robust image classifiers (to some extent).☆13Oct 14, 2020Updated 5 years ago
- Repairs an OBJ file on the command line☆10Jun 6, 2017Updated 8 years ago
- Demo of using keras to generate a neural network and iOS 11 to run the converted model.☆24Apr 16, 2020Updated 5 years ago
- ☆26Jun 29, 2018Updated 7 years ago
- ☆18Feb 9, 2020Updated 6 years ago
- Brief info and loader for public rPPG (remote Photoplethysmography) datasets☆15Aug 16, 2021Updated 4 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- ☆11Sep 23, 2022Updated 3 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- Buckle up, adventure in the styleGAN2-ada-pytorch network latent space awaits☆57Nov 18, 2021Updated 4 years ago
- Pytorch model recognizing hotdogs and not-hotdogs deployed on flask. Inspired by Sillicon Valley TV series.☆27Jan 22, 2022Updated 4 years ago
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- A place where all info about GladStoriesEngine interactive fiction runtime is saved.☆11Dec 26, 2019Updated 6 years ago
- The code of "Adversarial Metric Attack for Person Re-identification"☆30Feb 8, 2019Updated 7 years ago
- UDP/TCP Networking for Max/MSP 8+ (nodejs)☆14Nov 27, 2021Updated 4 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- 网络安全工作做使用到的工具、插件☆23Mar 8, 2022Updated 4 years ago
- ☆21Nov 22, 2023Updated 2 years ago
- Self-Hosting Security Dashboard☆14Feb 13, 2019Updated 7 years ago
- Creating and defending against adversarial examples☆41Jan 6, 2019Updated 7 years ago
- ☆20Aug 27, 2022Updated 3 years ago
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆58Jun 3, 2020Updated 5 years ago
- 六代兴亡如梦,苒苒惊时月。纵使岁寒途远,此志应难夺。☆11Mar 15, 2020Updated 6 years ago
- A program used to communicate with iBoot / iBSS using the libusb-1.0 api.☆21Aug 6, 2015Updated 10 years ago
- An example of how to transmit Quest hand-tracking-data over the network.☆37Aug 18, 2020Updated 5 years ago
- School for Poetic Computation website.☆25Dec 3, 2025Updated 3 months ago
- An ESP32 Port for Handheld Game Console Gamebuino☆17Feb 12, 2020Updated 6 years ago
- Demonstrates verifying OAuth 2 JSON web tokens using HAProxy☆14Jun 3, 2021Updated 4 years ago
- Generate pointless haikus about a place from OpenStreetMap data☆27Apr 16, 2024Updated last year
- Python 3 入门机器学习经典算法与应用☆10Mar 2, 2018Updated 8 years ago
- Fine tune a pixelart diffusion model with isometric dataset.☆13Feb 8, 2026Updated last month
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- ☆10Oct 5, 2018Updated 7 years ago
- Simple Tensorflow implementation of "Adaptive Convolutions for Structure-Aware Style Transfer" (CVPR 2021)☆25Aug 24, 2022Updated 3 years ago