VITA-Group / Privacy-AdversarialLearning
[ECCV 2018] Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study
☆38Updated 2 years ago
Alternatives and similar repositories for Privacy-AdversarialLearning:
Users that are interested in Privacy-AdversarialLearning are comparing it to the libraries listed below
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆45Updated 3 years ago
- Project page for our paper: Interpreting Adversarially Trained Convolutional Neural Networks☆66Updated 5 years ago
- ☆37Updated 2 years ago
- Code for "Adversarial Defense by Stratified Convolutional Sparse Coding"☆18Updated 5 years ago
- Implementation of our NeurIPS 2018 paper: Deep Defense: Training DNNs with Improved Adversarial Robustness☆39Updated 6 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆31Updated last year
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 2 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆15Updated 4 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Updated 5 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 5 years ago
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆59Updated 5 years ago
- Source code accompanying our CVPR 2019 paper: "NetTailor: Tuning the architecture, not just the weights."☆52Updated 3 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆13Updated 3 years ago
- [ICCV'19] Improving Adversarial Robustness via Guided Complement Entropy☆40Updated 5 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆59Updated 6 years ago
- Data independent universal adversarial perturbations☆61Updated 5 years ago
- ☆25Updated 5 years ago
- Knowledge Distillation with Adversarial Samples Supporting Decision Boundary (AAAI 2019)☆71Updated 5 years ago
- The code of "Adversarial Metric Attack for Person Re-identification"☆32Updated 6 years ago
- PyTorch Implementation of CVPR'19 (oral) - Mitigating Information Leakage in Image Representations: A Maximum Entropy Approach☆27Updated 5 years ago
- ☆13Updated 5 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60Updated 5 years ago
- Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images, CVPR 2018☆14Updated 6 years ago
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆32Updated 6 years ago
- VGAN-Based Image Representation Learning for Privacy-Preserving Facial Expression Recognition, CVPRW, 2018☆17Updated 6 years ago
- A fast sparse attack on deep neural networks.☆50Updated 4 years ago
- Robustness vs Accuracy Survey on ImageNet☆98Updated 3 years ago
- ☆25Updated 5 years ago
- [CVPR 2020] Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning☆85Updated 3 years ago
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Updated 5 years ago