EQuiw / 2019-scalingattack
Image-Scaling Attacks and Defenses
☆180Updated last year
Alternatives and similar repositories for 2019-scalingattack:
Users that are interested in 2019-scalingattack are comparing it to the libraries listed below
- building the next-gen watermark with deep learning.☆184Updated 3 years ago
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.☆137Updated this week
- Preimage attack against NeuralHash 💣☆672Updated last year
- 🏞 Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on i…☆105Updated 3 years ago
- Steps towards physical adversarial attacks on facial recognition☆80Updated last year
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆333Updated 4 years ago
- ☆37Updated 4 years ago
- The first real-world adversarial attack on MTCNN face detetction system to date☆71Updated 3 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆409Updated 3 years ago
- 🔥🔥Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networks☆326Updated 4 years ago
- ☆16Updated last year
- ☆33Updated 4 years ago
- ☆21Updated 3 years ago
- Data independent universal adversarial perturbations☆61Updated 4 years ago
- A fast sparse attack on deep neural networks.☆50Updated 4 years ago
- duralava is a neural network which can simulate a lava lamp in an infinite loop.☆90Updated last year
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆59Updated 5 years ago
- ☆84Updated last year
- ☆83Updated 4 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆23Updated 5 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆137Updated 4 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆66Updated 6 years ago
- Official Pytorch implementation of paper "Reverse Engineering of Generative Models: Inferring Model Hyperparameters from Generated Images…☆138Updated last year
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆57Updated 5 years ago
- PyTorch implementation of adversarial patch☆209Updated 2 years ago
- ☆40Updated last year
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆37Updated 4 years ago
- A simple optical illusion in python☆41Updated 4 years ago
- ☆47Updated 4 years ago
- PyTorch implementation of DCGAN, WGAN-GP and SNGAN.☆225Updated 3 years ago