Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topics in Deep Learning course at Aalto University, Finland.
☆66Nov 23, 2019Updated 6 years ago
Alternatives and similar repositories for Universal-Adversarial-Perturbations-Pytorch
Users that are interested in Universal-Adversarial-Perturbations-Pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆46Apr 16, 2019Updated 7 years ago
- ☆249Jan 12, 2019Updated 7 years ago
- Official repository of "FocusFace: Multi-task Contrastive Learning for Masked Face Recognition"☆27Jan 30, 2025Updated last year
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Jul 15, 2019Updated 6 years ago
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆27Mar 6, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- Official repository for the OCFR 2022: Competition on Occluded Face Recognition From Synthetically Generated Structure-Aware Occlusions a…☆17Apr 13, 2024Updated 2 years ago
- Official repository of paper "GraFIQs: Face Image Quality Assessment Using Gradient Magnitudes"☆29Oct 16, 2024Updated last year
- MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders☆20Mar 1, 2023Updated 3 years ago
- ☆13Apr 27, 2023Updated 3 years ago
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 6 years ago
- FRoundation: Are Foundation Models Ready for Face Recognition?☆12Jul 29, 2025Updated 9 months ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆39Jul 22, 2024Updated last year
- ☆14Jul 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Unsupervised Face Morphing Attack Detection via Self-paced Anomaly Detection☆19Aug 11, 2022Updated 3 years ago
- An implementation of the paper "Overcoming catastrophic forgetting in neural networks" (DeepMind, 2016), using Pytorch framework.☆16Sep 9, 2018Updated 7 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- SFace: Privacy-friendly and Accurate Face Recognition using Synthetic Data☆43Jul 10, 2024Updated last year
- ☆23Aug 24, 2020Updated 5 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 9 months ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆58Updated this week
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Apr 5, 2022Updated 4 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Nov 16, 2022Updated 3 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 4 years ago
- Universal Adversarial Perturbations for Vision-Language Pre-trained Models☆24Aug 8, 2025Updated 8 months ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- ☆26Dec 1, 2022Updated 3 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- ☆15Dec 19, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Unsupervised Face Recognition using Unlabeled Synthetic Data☆26Mar 14, 2023Updated 3 years ago
- Tensorflow implementation of "Defense against Universal Adversarial Perturbations"☆10Apr 16, 2018Updated 8 years ago
- ☆13May 1, 2024Updated 2 years ago
- Implementation of TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems (https://arxiv.org/pdf/190…☆19Apr 13, 2023Updated 3 years ago
- Official repository for Mask-invariant Face Recognition through Template-level Knowledge Distillation☆48Jan 13, 2022Updated 4 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- ☆26Jan 25, 2019Updated 7 years ago