MADONOKOUKI / Block-wise-Scrambled-Image-RecognitionLinks
Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)
☆11Updated 5 years ago
Alternatives and similar repositories for Block-wise-Scrambled-Image-Recognition
Users that are interested in Block-wise-Scrambled-Image-Recognition are comparing it to the libraries listed below
Sorting:
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Updated 3 years ago
- Trained model weights, training and evaluation code from the paper "A simple way to make neural networks robust against diverse image cor…☆61Updated 2 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Updated 3 years ago
- PyTorch Implementation of CVPR'19 (oral) - Mitigating Information Leakage in Image Representations: A Maximum Entropy Approach☆28Updated 5 years ago
- ☆20Updated 2 years ago
- Attacks against proposed image encryption schemes☆10Updated 5 years ago
- ☆25Updated 5 years ago
- PRIME: A Few Primitives Can Boost Robustness to Common Corruptions☆42Updated 2 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- Learning Robust Global Representations by Penalizing Local Predictive Power (NeurIPS 2019))☆18Updated 2 years ago
- Source code of "Hold me tight! Influence of discriminative features on deep network boundaries"☆22Updated 3 years ago
- Implementation for What it Thinks is Important is Important: Robustness Transfers through Input Gradients (CVPR 2020 Oral)☆16Updated 2 years ago
- Multi-Domain Image-to-Image Translation using StarGAN with Max Sliced Wasserstein Distance.☆14Updated 6 years ago
- Code for "Transfer Learning without Knowing: Reprogramming Black-box Machine Learning Models with Scarce Data and Limited Resources". (IC…☆38Updated 4 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Updated 2 years ago
- ☆29Updated 6 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Updated 2 years ago
- This code reproduces the results of the paper, "Measuring Data Leakage in Machine-Learning Models with Fisher Information"☆50Updated 3 years ago
- Research prototype of deletion efficient k-means algorithms☆24Updated 5 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Updated 7 years ago
- Pre-Training Buys Better Robustness and Uncertainty Estimates (ICML 2019)☆100Updated 3 years ago
- Self-Distillation with weighted ground-truth targets; ResNet and Kernel Ridge Regression☆18Updated 3 years ago
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆53Updated 4 years ago
- Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images, CVPR 2018☆15Updated 6 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆36Updated 4 years ago
- source code of Adversarial Feedback Loop Paper☆18Updated 6 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆47Updated last year
- Fine-grained ImageNet annotations☆29Updated 5 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- This github repository contains the official code for the paper, "Evolving Robust Neural Architectures to Defend from Adversarial Attacks…☆18Updated last year