PolyLiYJ / SLAttackLinks
code for paper "Physical-World Optical Adversarial Attacks on 3D Face Recognition"
☆20Updated 2 years ago
Alternatives and similar repositories for SLAttack
Users that are interested in SLAttack are comparing it to the libraries listed below
Sorting:
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Updated 3 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆46Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Updated 3 years ago
- PyTorch implementation of Adversarial Patch☆15Updated 2 years ago
- ☆36Updated last year
- ☆62Updated 4 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Updated 2 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆46Updated 2 years ago
- An adversarial robustness evaluation library on face recognition.☆114Updated 2 years ago
- ☆12Updated 2 years ago
- official repository for the NeurIPS 2022 paper "Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Att…☆20Updated 3 years ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22Updated 3 years ago
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Updated last year
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Updated 2 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆24Updated 2 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 3 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92Updated 2 years ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability