MADONOKOUKI / Block-wise-Scrambled-Image-Recognition
Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)
☆11Updated 5 years ago
Alternatives and similar repositories for Block-wise-Scrambled-Image-Recognition:
Users that are interested in Block-wise-Scrambled-Image-Recognition are comparing it to the libraries listed below
- Attacks against proposed image encryption schemes☆10Updated 5 years ago
- ☆20Updated 2 years ago
- Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images, CVPR 2018☆15Updated 6 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Updated 2 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Updated 3 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Updated 3 years ago
- Code for "JPEG-resistant Adversarial Images"☆42Updated 7 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- ☆13Updated 3 years ago
- Official PyTorch implementation for our ICCV 2019 paper - Fooling Network Interpretation in Image Classification☆24Updated 5 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆35Updated 4 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 6 years ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆22Updated 3 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Updated 7 years ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆31Updated last year
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Updated 5 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆43Updated last year
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Updated 3 years ago
- A fast sparse attack on deep neural networks.☆50Updated 4 years ago
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆53Updated 4 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆46Updated last year
- ☆35Updated 4 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆15Updated 4 years ago
- This code reproduces the results of the paper, "Measuring Data Leakage in Machine-Learning Models with Fisher Information"☆50Updated 3 years ago
- PyTorch Implementation of CVPR'19 (oral) - Mitigating Information Leakage in Image Representations: A Maximum Entropy Approach☆27Updated 5 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆17Updated 3 years ago
- ☆41Updated 3 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 2 years ago
- ☆25Updated 4 years ago
- Targeted Mismatch Adversarial Attack☆17Updated 5 years ago