Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch
☆15Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for Perturbation-Inactivate
Users that are interested in Perturbation-Inactivate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cleaned test data list of DukeMTMC-reID, ICCV2021☆15Aug 26, 2021Updated 4 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- Forward-reverse Adaptive Graph Convolutional Networks for Skeleton-Based Action Recognition☆12May 19, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- The OCI-OpenAI simplifies integration between OpenAI’s Python SDK and Oracle Cloud Infrastructure (OCI) GenAI service by providing robust…☆31Mar 17, 2026Updated last month
- 经典书籍共读☆18May 29, 2019Updated 6 years ago
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Mar 3, 2026Updated last month
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆79Jan 13, 2022Updated 4 years ago
- Federated Adversrial Learning/ Training Framework. A testing ground for conducting relevant research.☆11Oct 9, 2022Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Multi-Sensor Fusion Algorithm in Localization for vehicles based on extended Kalman filter☆15Sep 2, 2022Updated 3 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Official Dynamic Graph Representation PyTorch implement for iris/face recognition☆54Jun 25, 2024Updated last year
- Original PyTorch implementation of the AdversarialMask paper☆23Apr 16, 2023Updated 3 years ago
- The official PyTorch implementations for Latent-HSJA.☆29Nov 3, 2023Updated 2 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders☆20Mar 1, 2023Updated 3 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆11Apr 6, 2019Updated 7 years ago
- Implementation of Federated Learning algorithms such as FedAvg, FedAvgM, SCAFFOLD, FedOpt, Mime using PyTorch.☆12Jan 2, 2023Updated 3 years ago
- Exploiting Label Skew in Federated Learning with Model Concatenation (AAAI 2024)☆13Dec 16, 2023Updated 2 years ago
- tempeh is a framework to TEst Machine learning PErformance exHaustively which includes tracking memory usage and run time.☆18Jan 3, 2022Updated 4 years ago
- (EMBC 2020) Camera-based Hand Tracking using a Mirror-based Multi-view Setup☆15Dec 11, 2021Updated 4 years ago
- https://arxiv.org/abs/2102.12594☆14Oct 3, 2023Updated 2 years ago
- Paper sharing in adversary related works☆46Apr 24, 2026Updated last week
- ☆43May 21, 2020Updated 5 years ago
- List of diffusion papers accepted in ECCV 2024.☆15Oct 17, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Wikipedia "people" Images Dataset Downloader☆11Dec 3, 2023Updated 2 years ago
- 一个基于 **LangChain 1.0**、**阿里通义 Qwen** 和 **MCP(amap-maps)** 的旅游规划 Agent Demo,支持: - 并行调用高德地图相关工具(搜索 POI、路线规划、天气查询) - 中间件级别的城市约束、工具预算控制、输出城市…☆33Jan 22, 2026Updated 3 months ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Mar 25, 2023Updated 3 years ago
- ☆16Dec 18, 2023Updated 2 years ago
- Image Decomposition in GAN network(Reference:Deep Adversarial Decomposition: A Unified Framework for Separating Superimposed Images, CVPR…☆17Jul 15, 2020Updated 5 years ago
- ☆11Sep 10, 2024Updated last year
- An Orthogonal Classifier for Improving the Adversarial Robustness of Neural Networks☆14Oct 22, 2021Updated 4 years ago