EQuiw / 2019-scalingattackLinks
Image-Scaling Attacks and Defenses
☆183Updated 2 years ago
Alternatives and similar repositories for 2019-scalingattack
Users that are interested in 2019-scalingattack are comparing it to the libraries listed below
Sorting:
- building the next-gen watermark with deep learning.☆185Updated 3 years ago
- ☆21Updated 4 years ago
- Preimage attack against NeuralHash 💣☆671Updated 2 years ago
- 🔥🔥Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networks☆339Updated 5 years ago
- Synthesize photos from PhotoDNA using machine learning 🌱☆145Updated 6 months ago
- Steps towards physical adversarial attacks on facial recognition☆84Updated last year
- PyTorch implementation of DCGAN, WGAN-GP and SNGAN.☆230Updated 3 years ago
- Code for the paper: CNN-generated images are surprisingly easy to spot... for now https://peterwang512.github.io/CNNDetection/☆942Updated last year
- Privacy Testing for Deep Learning☆208Updated 2 years ago
- ☆33Updated 4 years ago
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.☆137Updated 6 months ago
- 🏞 Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on i…☆105Updated 3 years ago
- ☆18Updated 2 years ago
- Official Pytorch implementation of paper "Reverse Engineering of Generative Models: Inferring Model Hyperparameters from Generated Images…☆140Updated last year
- Break neural networks in your browser 🦹♂️☆153Updated 3 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆338Updated 4 years ago
- ☆86Updated last year
- Invisible Hyperlinks in Physical Photographs☆771Updated last year
- ARMORY Adversarial Robustness Evaluation Test Bed☆182Updated last year
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- ☆128Updated 3 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆127Updated 7 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆414Updated 4 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆78Updated 2 years ago
- PyTorch Implementation of "Lossless Image Compression through Super-Resolution"☆1,054Updated last year
- Protect your machine learning models easily and securely with watermarking 🔑☆97Updated last year
- duralava is a neural network which can simulate a lava lamp in an infinite loop.☆90Updated 2 years ago
- DeepPrivacy: A Generative Adversarial Network for Face Anonymization☆1,299Updated last year
- Simple scheduler for running jobs on GPUs☆180Updated 4 years ago
- ☆132Updated 3 years ago