[CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer".
☆92May 10, 2023Updated 2 years ago
Alternatives and similar repositories for AMT-GAN
Users that are interested in AMT-GAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- ☆63Aug 31, 2021Updated 4 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- [CVPR 2023] Official repository of paper titled "CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent …☆102Mar 25, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- ☆34Sep 6, 2025Updated 7 months ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆55Oct 14, 2024Updated last year
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- [AAAI 2022] This is the official pytorch code for SSAT: A Symmetric Semantic-Aware Transformer Network for Makeup Transfer and Removal☆99Dec 24, 2024Updated last year
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editing☆13Apr 21, 2024Updated 2 years ago
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆46Jan 24, 2024Updated 2 years ago
- [TMM 2022] ISF-GAN.☆18Dec 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆17Feb 12, 2025Updated last year
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Apr 22, 2022Updated 4 years ago
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆110May 6, 2024Updated last year
- ☆26Nov 7, 2023Updated 2 years ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆20Aug 22, 2024Updated last year
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- ☆43May 21, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆25May 25, 2023Updated 2 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Aug 3, 2022Updated 3 years ago
- Adaptive Nonlinear Latent Transformation for Conditional Face Editing (ICCV 2023)☆37Jul 30, 2023Updated 2 years ago
- ☆155Jan 19, 2022Updated 4 years ago
- Code and videos accompanying the paper "Flickering Adversarial Attacks against Video Recognition Networks"☆16Dec 8, 2022Updated 3 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- An Asian Large-Scale Challenging Dataset for DeepFake Detection☆13Jan 23, 2026Updated 3 months ago
- Source code for paper "Targeted Adversarial Attack for Deep Cross-modal Hashing Retrieval".☆19May 4, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- (2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition☆10Apr 3, 2026Updated 3 weeks ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆94Mar 24, 2023Updated 3 years ago
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆63Apr 7, 2024Updated 2 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- Official PyTorch implementation of CIAGAN☆85Jan 25, 2021Updated 5 years ago
- A fast method for real face morphing (一个可以快速部署实现的人脸变形方法)☆11May 31, 2022Updated 3 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆59Jun 18, 2021Updated 4 years ago