An adversarial robustness evaluation library on face recognition.
☆113Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for Face-Robustness-Benchmark
Users that are interested in Face-Robustness-Benchmark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆42Mar 11, 2022Updated 4 years ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22May 13, 2022Updated 3 years ago
- ☆35Dec 9, 2020Updated 5 years ago
- ☆16Jul 25, 2022Updated 3 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆45Aug 12, 2023Updated 2 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆141Aug 23, 2023Updated 2 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 6 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- ☆43May 21, 2020Updated 5 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆51Nov 2, 2020Updated 5 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Empirical tricks for training robust models (ICLR 2021)☆256May 25, 2023Updated 2 years ago
- Adversarial Distributional Training (NeurIPS 2020)☆63Mar 17, 2021Updated 5 years ago
- ☆12May 6, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60May 14, 2019Updated 6 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆415Jul 6, 2021Updated 4 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- A Self-Consistent Robust Error (ICML 2022)☆68Jun 25, 2023Updated 2 years ago
- The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL☆237Mar 27, 2018Updated 7 years ago
- ☆162Feb 26, 2021Updated 5 years ago
- ☆38Jul 13, 2020Updated 5 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆337Feb 18, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- A novel data-free model stealing method based on GAN☆133Oct 11, 2022Updated 3 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- The first real-world adversarial attack on MTCNN face detetction system to date☆71May 27, 2021Updated 4 years ago
- Paper sharing in adversary related works☆46Aug 14, 2025Updated 7 months ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago