Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch
☆15Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for Perturbation-Inactivate
Users that are interested in Perturbation-Inactivate are comparing it to the libraries listed below
Sorting:
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- ☆36May 29, 2024Updated last year
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Dec 6, 2023Updated 2 years ago
- The official PyTorch implementations for Latent-HSJA.☆29Nov 3, 2023Updated 2 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- ☆11Apr 6, 2019Updated 6 years ago
- Facial recognition system to recognize me and my sister, and to work even with a face mask.☆12Feb 23, 2021Updated 5 years ago
- Generating Human Skeletons with Mutual Actions☆11Oct 22, 2021Updated 4 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆12Jul 24, 2024Updated last year
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- [IEEE TGRS 2022] Universal Adversarial Examples in Remote Sensing: Methodology and Benchmark☆44May 12, 2022Updated 3 years ago
- An end-to-end framework for pulmonary airway analysis☆19Jan 19, 2026Updated last month
- ☆10Jan 25, 2021Updated 5 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- Prototypical Contrast and Reverse Prediction: Unsupervised Skeleton based Action Recognition☆11Aug 30, 2021Updated 4 years ago
- [JAG 2024] UAD-RS: Universal adversarial defense in remote sensing based on pre-trained denoising diffusion models☆12Nov 8, 2024Updated last year
- Articulated Pose Estimator algorithm for human hands and body☆13Sep 21, 2018Updated 7 years ago
- Phase-aware Adversarial Defense for Improving Adversarial Robustness☆11Oct 12, 2023Updated 2 years ago
- Forward-reverse Adaptive Graph Convolutional Networks for Skeleton-Based Action Recognition☆11May 19, 2023Updated 2 years ago
- ☆10Mar 24, 2022Updated 3 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Aug 9, 2019Updated 6 years ago
- Federated Adversrial Learning/ Training Framework. A testing ground for conducting relevant research.☆11Oct 9, 2022Updated 3 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- This is my master's thesis , it research about watermarking based on DWT frequency domain☆10May 9, 2018Updated 7 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- 可用于《宝可梦》第四世代汉化修正版的 PKHeX 版本☆12Jul 19, 2025Updated 7 months ago
- Official Dynamic Graph Representation PyTorch implement for iris/face recognition☆53Jun 25, 2024Updated last year
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- Cleaned test data list of DukeMTMC-reID, ICCV2021☆15Aug 26, 2021Updated 4 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- tempeh is a framework to TEst Machine learning PErformance exHaustively which includes tracking memory usage and run time.☆18Jan 3, 2022Updated 4 years ago
- ☆12Sep 10, 2024Updated last year
- Video captioning on MSR-VTT Dataset☆12Mar 21, 2021Updated 4 years ago
- Demo code for the paper: One Thing to Fool them All: Generating Interpretable, Universal, and Physically-Realizable Adversarial Features☆12Nov 30, 2023Updated 2 years ago
- PokeClassic is a romhack inspired by Pokemon Yellow, using the Pokemon Emerald Engine. This romhack was originally made by danenders. Thi…☆19Updated this week