Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch
☆15Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for Perturbation-Inactivate
Users that are interested in Perturbation-Inactivate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36May 29, 2024Updated last year
- ☆31Jun 22, 2021Updated 4 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- Forward-reverse Adaptive Graph Convolutional Networks for Skeleton-Based Action Recognition☆12May 19, 2023Updated 2 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Mar 3, 2026Updated 2 weeks ago
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Multi-Sensor Fusion Algorithm in Localization for vehicles based on extended Kalman filter☆15Sep 2, 2022Updated 3 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- Steps towards physical adversarial attacks on facial recognition☆83Oct 3, 2023Updated 2 years ago
- Compute action classification accuracy from skeleton joints using LSTM☆15Mar 24, 2020Updated 5 years ago
- The official PyTorch implementations for Latent-HSJA.☆29Nov 3, 2023Updated 2 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders☆19Mar 1, 2023Updated 3 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- mapping 2D person joints to 3D SMPL model☆25Aug 20, 2018Updated 7 years ago
- ☆11Apr 6, 2019Updated 6 years ago
- 一个基于 **LangChain 1.0**、**阿里通义 Qwen** 和 **MCP(amap-maps)** 的旅游规划 Agent Demo,支持: - 并行调用高德地图相关工具(搜索 POI、路线规划、天气查询) - 中间件级别的城市约束、工具预算控制、输出城市…☆26Jan 22, 2026Updated 2 months ago
- Exploiting Label Skew in Federated Learning with Model Concatenation (AAAI 2024)☆14Dec 16, 2023Updated 2 years ago
- (EMBC 2020) Camera-based Hand Tracking using a Mirror-based Multi-view Setup☆15Dec 11, 2021Updated 4 years ago
- ☆43May 21, 2020Updated 5 years ago
- Paper sharing in adversary related works☆46Aug 14, 2025Updated 7 months ago
- List of diffusion papers accepted in ECCV 2024.☆15Oct 17, 2024Updated last year
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- An Orthogonal Classifier for Improving the Adversarial Robustness of Neural Networks☆14Oct 22, 2021Updated 4 years ago
- Image Decomposition in GAN network(Reference:Deep Adversarial Decomposition: A Unified Framework for Separating Superimposed Images, CVPR…☆17Jul 15, 2020Updated 5 years ago
- [JAG 2024] UAD-RS: Universal adversarial defense in remote sensing based on pre-trained denoising diffusion models☆12Nov 8, 2024Updated last year
- [IEEE TGRS 2022] Universal Adversarial Examples in Remote Sensing: Methodology and Benchmark☆44May 12, 2022Updated 3 years ago
- ☆17Mar 6, 2024Updated 2 years ago
- ☆10Jan 25, 2021Updated 5 years ago
- Generating Human Skeletons with Mutual Actions☆11Oct 22, 2021Updated 4 years ago
- Pytorch classification with Cifar-10, Cifar-100, and STL-10☆14Jul 24, 2019Updated 6 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago