EQuiw / 2019-scalingattack
Image-Scaling Attacks and Defenses
☆171Updated last year
Related projects: ⓘ
- building the next-gen watermark with deep learning.☆181Updated 3 years ago
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.☆136Updated 3 years ago
- STEGASURAS: STEGanography via Arithmetic coding and Strong neURAl modelS☆182Updated last month
- The first real-world adversarial attack on MTCNN face detetction system to date☆72Updated 3 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆36Updated 4 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆329Updated 3 years ago
- ☆82Updated 10 months ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆74Updated last year
- Preimage attack against NeuralHash 💣☆664Updated last year
- Black-Box Adversarial Attack on Public Face Recognition Systems☆402Updated 3 years ago
- ☆76Updated 3 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆58Updated 5 years ago
- Protect your machine learning models easily and securely with watermarking 🔑☆86Updated 4 months ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆116Updated 2 years ago
- Synthesize photos from PhotoDNA using machine learning 🌱☆141Updated last year
- Steps towards physical adversarial attacks on facial recognition☆79Updated 11 months ago
- ☆31Updated 4 years ago
- Privacy Testing for Deep Learning☆183Updated last year
- Data independent universal adversarial perturbations☆61Updated 4 years ago
- PyTorch implementation of Adversarial Patch☆13Updated last year
- ☆41Updated last year
- Implementation of the Biased Boundary Attack for ImageNet☆22Updated 5 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆185Updated 4 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆50Updated 3 years ago
- ☆120Updated 2 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆61Updated 4 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆41Updated 10 months ago
- Detecting Adversarial Examples in Deep Neural Networks☆65Updated 6 years ago
- [NeurIPS 2019] This is the code repo of our novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into va…☆77Updated last year
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Updated 4 years ago