EQuiw / 2019-scalingattackLinks
Image-Scaling Attacks and Defenses
β185Updated 2 years ago
Alternatives and similar repositories for 2019-scalingattack
Users that are interested in 2019-scalingattack are comparing it to the libraries listed below
Sorting:
- building the next-gen watermark with deep learning.β185Updated 4 years ago
- Preimage attack against NeuralHash π£β672Updated 2 months ago
- β22Updated 4 years ago
- π₯π₯Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networksβ345Updated 5 years ago
- DeepPrivacy: A Generative Adversarial Network for Face Anonymizationβ1,301Updated 2 years ago
- Synthesize photos from PhotoDNA using machine learning π±β148Updated 2 months ago
- β33Updated 5 years ago
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.β137Updated 9 months ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID systemβ337Updated 4 years ago
- PyTorch implementation of DCGAN, WGAN-GP and SNGAN.β230Updated 3 years ago
- π Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on iβ¦β106Updated 4 years ago
- β87Updated 2 years ago
- Privacy Testing for Deep Learningβ209Updated 2 months ago
- PyTorch Implementation of "Lossless Image Compression through Super-Resolution"β1,051Updated 2 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning modelsβ83Updated 2 years ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"β18Updated last month
- β87Updated 4 years ago
- Implementation of the Biased Boundary Attack for ImageNetβ22Updated 6 years ago
- Steps towards physical adversarial attacks on facial recognitionβ84Updated 2 years ago
- β129Updated 3 years ago
- This technique modifies image data so that any model trained on it will bear an identifiable mark.β43Updated 4 years ago
- Protect your machine learning models easily and securely with watermarking πβ97Updated last year
- A novel data-free model stealing method based on GANβ133Updated 3 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize β¦β61Updated 6 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with Oβ¦β37Updated 5 years ago
- PyTorch implementation of adversarial patchβ216Updated 3 years ago
- Official Pytorch implementation of paper "Reverse Engineering of Generative Models: Inferring Model Hyperparameters from Generated Imagesβ¦β141Updated last year
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"β30Updated 5 years ago
- ARMORY Adversarial Robustness Evaluation Test Bedβ186Updated last year
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020β53Updated 5 years ago