EQuiw / 2019-scalingattackLinks
Image-Scaling Attacks and Defenses
β185Updated 2 years ago
Alternatives and similar repositories for 2019-scalingattack
Users that are interested in 2019-scalingattack are comparing it to the libraries listed below
Sorting:
- building the next-gen watermark with deep learning.β185Updated 4 years ago
- Preimage attack against NeuralHash π£β673Updated 4 months ago
- β22Updated 4 years ago
- π₯π₯Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networksβ344Updated 5 years ago
- DeepPrivacy: A Generative Adversarial Network for Face Anonymizationβ1,307Updated 2 years ago
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.β137Updated 11 months ago
- PyTorch implementation of DCGAN, WGAN-GP and SNGAN.β230Updated 4 years ago
- Steps towards physical adversarial attacks on facial recognitionβ83Updated 2 years ago
- π Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on iβ¦β106Updated 4 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID systemβ337Updated 4 years ago
- β33Updated 5 years ago
- Synthesize photos from PhotoDNA using machine learning π±β149Updated 4 months ago
- Official Pytorch implementation of paper "Reverse Engineering of Generative Models: Inferring Model Hyperparameters from Generated Imagesβ¦β141Updated 2 years ago
- PyTorch Implementation of "Lossless Image Compression through Super-Resolution"β1,056Updated 2 years ago
- Break neural networks in your browser π¦ΉββοΈβ157Updated 3 years ago
- ARMORY Adversarial Robustness Evaluation Test Bedβ189Updated 2 years ago
- Perceptual hashing tools for detecting child sexual abuse materialβ197Updated 2 weeks ago
- Black-Box Adversarial Attack on Public Face Recognition Systemsβ415Updated 4 years ago
- β130Updated 4 years ago
- Code for the paper: CNN-generated images are surprisingly easy to spot... for now https://peterwang512.github.io/CNNDetection/β980Updated last year
- β89Updated 2 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize β¦β61Updated 6 years ago
- A simple and accurate method to fool deep neural networksβ361Updated 5 years ago
- Privacy Testing for Deep Learningβ210Updated 5 months ago
- β136Updated 4 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with Oβ¦β37Updated 5 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning modelsβ84Updated 2 years ago
- β18Updated 2 years ago
- A light version of Tor portable to the browserβ120Updated 5 years ago
- This technique modifies image data so that any model trained on it will bear an identifiable mark.β44Updated 4 years ago