安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place
☆69Dec 9, 2019Updated 6 years ago
Alternatives and similar repositories for TIANCHI_BlackboxAdversial
Users that are interested in TIANCHI_BlackboxAdversial are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Oct 1, 2019Updated 6 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆416Jul 6, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 3 years ago
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- ☆43May 21, 2020Updated 5 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Apr 1, 2024Updated 2 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆140Aug 23, 2023Updated 2 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- Meta-Reinforcement Learning with Policy Residual Representation☆11Aug 15, 2019Updated 6 years ago
- ☆72May 18, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- An adversarial robustness evaluation library on face recognition.☆113Jul 6, 2023Updated 2 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆16May 26, 2020Updated 5 years ago
- ☆10May 14, 2023Updated 2 years ago
- ☆17Feb 25, 2019Updated 7 years ago
- Explainable Face Recognition ECCV 2020 Paper code and dataset repository☆65Apr 28, 2021Updated 5 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Probabilistic Face Embeddings[2019-ICCV]☆23Apr 28, 2020Updated 6 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆338Feb 18, 2021Updated 5 years ago
- ☆66Jun 9, 2018Updated 7 years ago
- ☆21Jun 10, 2020Updated 5 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- Slither-in Inspired Snake Environment for OpenAI Gym (Part of Requests for Research 2.0)☆12Mar 5, 2018Updated 8 years ago
- Adaface with PartialFC☆27Apr 12, 2024Updated 2 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Empc: Effective Path Prioritization for Symbolic Execution with Path Cover☆34May 11, 2025Updated 11 months ago
- Pytorch implementation of the Attentive Spatial-Temporal Pooling Networks by Shuangjie Xu(2017.https://arxiv.org/abs/1708.02286)☆12Jun 10, 2018Updated 7 years ago
- A novel data-free model stealing method based on GAN☆134Oct 11, 2022Updated 3 years ago
- A PyTorch baseline defense example for the NIPS 2017 adversarial competition☆11Aug 3, 2017Updated 8 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- 基于wenet的短时在线语音识别服务☆11Feb 25, 2023Updated 3 years ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago