☆42Mar 11, 2022Updated 4 years ago
Alternatives and similar repositories for TIP-IM
Users that are interested in TIP-IM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An adversarial robustness evaluation library on face recognition.☆113Jul 6, 2023Updated 2 years ago
- ☆16Jul 25, 2022Updated 3 years ago
- ☆35Dec 9, 2020Updated 5 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- ☆34Jul 26, 2022Updated 3 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Apr 22, 2022Updated 3 years ago
- ☆21Aug 7, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆14Apr 11, 2018Updated 7 years ago
- ☆20Mar 14, 2022Updated 4 years ago
- Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)☆12Dec 3, 2019Updated 6 years ago
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- ☆12May 6, 2022Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆45Aug 12, 2023Updated 2 years ago
- Original PyTorch implementation of the AdversarialMask paper☆22Apr 16, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10May 14, 2023Updated 2 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- EqualAIs was a project that began as a part of the 2018 Assembly program at the Berkman Klein Center at Harvard University and the MIT Me…☆18Feb 24, 2021Updated 5 years ago
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- ☆133Sep 25, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- [ICLR 2026] The official code for "Doxing via the Lens: Revealing Location-related Privacy Leakage on Multi-modal Large Reasoning Models"☆25Feb 7, 2026Updated last month
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- [NeurIPS25 & ICML25 Workshop on Reliable and Responsible Foundation Models] A Simple Baseline Achieving Over 90% Success Rate Against the…☆90Feb 3, 2026Updated last month
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- Official Code for Efficient and Effective Augmentation Strategy for Adversarial Training (NeurIPS-2022)☆17Mar 29, 2023Updated 2 years ago