bwtseng / Compressive-Privacy-Generative-Adversarial-NetworkLinks
This repository includes all implementations about the experiments mentioned in our published manuscript. If there has any problems, please be free to contact us! Thank You.
☆13Updated 5 years ago
Alternatives and similar repositories for Compressive-Privacy-Generative-Adversarial-Network
Users that are interested in Compressive-Privacy-Generative-Adversarial-Network are comparing it to the libraries listed below
Sorting:
- ☆41Updated 3 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Updated 5 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 5 years ago
- (IJCAI 2019) Knowledge Amalgamation from Heterogeneous Networks by Common Feature Learning☆10Updated 3 years ago
- ☆29Updated 5 years ago
- A PyTorch implementation of Grad-CAM based on ICCV 2017 paper "Grad-CAM: Visual Explanations from Deep Networks via Gradient-based Local…☆61Updated 7 years ago
- Face recognition with loss of softmax, sphereface, cosface, arcface in pytorch of python3☆10Updated 5 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 4 years ago
- A novel data-free model stealing method based on GAN☆133Updated 3 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 3 years ago
- [NeurIPS 2020] "Once-for-All Adversarial Training: In-Situ Tradeoff between Robustness and Accuracy for Free" by Haotao Wang*, Tianlong C…☆44Updated 3 years ago
- PyTorch implementation of "Feature Denoising for Improving Adversarial Robustness" on CIFAR10.☆35Updated 5 years ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Updated 4 years ago
- Explainable Face Recognition ECCV 2020 Paper code and dataset repository☆64Updated 4 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆47Updated 4 years ago
- ☆23Updated 6 years ago
- IJCV22 Attack your retrieval model via Query! They are not robust as you expected!☆48Updated 3 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Updated 6 years ago
- ☆21Updated 3 years ago
- Code for paper 'FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis'☆36Updated 3 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆61Updated 2 years ago
- ☆13Updated 3 years ago
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆72Updated 3 years ago
- An adversarial robustness evaluation library on face recognition.☆113Updated 2 years ago
- ☆108Updated 3 years ago
- Code for "Transfer Learning without Knowing: Reprogramming Black-box Machine Learning Models with Scarce Data and Limited Resources". (IC…☆38Updated 5 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Updated 6 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 5 years ago
- [CVPR 2020] When NAS Meets Robustness: In Search of Robust Architectures against Adversarial Attacks☆124Updated 5 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Updated 4 years ago