EQuiw / 2019-scalingattackLinks
Image-Scaling Attacks and Defenses
☆184Updated 2 years ago
Alternatives and similar repositories for 2019-scalingattack
Users that are interested in 2019-scalingattack are comparing it to the libraries listed below
Sorting:
- building the next-gen watermark with deep learning.☆185Updated 4 years ago
- ☆21Updated 4 years ago
- Preimage attack against NeuralHash 💣☆673Updated last month
- 🏞 Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on i…☆104Updated 4 years ago
- 🔥🔥Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networks☆343Updated 5 years ago
- ☆86Updated last year
- PyTorch implementation of DCGAN, WGAN-GP and SNGAN.☆230Updated 3 years ago
- ARMORY Adversarial Robustness Evaluation Test Bed☆186Updated last year
- ☆33Updated 5 years ago
- Synthesize photos from PhotoDNA using machine learning 🌱☆146Updated last month
- PyTorch Implementation of "Lossless Image Compression through Super-Resolution"☆1,054Updated 2 years ago
- ☆86Updated 4 years ago
- Protect your machine learning models easily and securely with watermarking 🔑☆97Updated last year
- Copycat CNN☆27Updated last year
- ☆129Updated 3 years ago
- Privacy Testing for Deep Learning☆210Updated last month
- DeepPrivacy: A Generative Adversarial Network for Face Anonymization☆1,302Updated last year
- This technique modifies image data so that any model trained on it will bear an identifiable mark.☆42Updated 4 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆82Updated 2 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Updated 6 years ago
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.☆137Updated 8 months ago
- Official Pytorch implementation of paper "Reverse Engineering of Generative Models: Inferring Model Hyperparameters from Generated Images…☆140Updated last year
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆123Updated 3 years ago
- A novel data-free model stealing method based on GAN☆131Updated 3 years ago
- Human Response Code: Designed to be recognized by humans and OCR. Encodes all valid URL characters to images.☆228Updated 5 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆67Updated 7 years ago
- ☆99Updated 5 years ago
- Utility to find AES keys in running processes☆335Updated 2 years ago
- [NeurIPS 2019] This is the code repo of our novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into va…☆84Updated 2 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆59Updated 4 years ago