bwtseng / Compressive-Privacy-Generative-Adversarial-NetworkLinks
This repository includes all implementations about the experiments mentioned in our published manuscript. If there has any problems, please be free to contact us! Thank You.
☆13Updated 5 years ago
Alternatives and similar repositories for Compressive-Privacy-Generative-Adversarial-Network
Users that are interested in Compressive-Privacy-Generative-Adversarial-Network are comparing it to the libraries listed below
Sorting:
- ☆41Updated 3 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆47Updated 4 years ago
- A PyTorch implementation of Grad-CAM based on ICCV 2017 paper "Grad-CAM: Visual Explanations from Deep Networks via Gradient-based Local…☆60Updated 7 years ago
- ☆29Updated 5 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Updated 4 years ago
- ☆23Updated 4 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Updated 5 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 5 years ago
- PyTorch implementation of "Feature Denoising for Improving Adversarial Robustness" on CIFAR10.☆35Updated 5 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Updated 5 years ago
- ☆108Updated 3 years ago
- ☆13Updated 4 years ago
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Updated 4 years ago
- ☆43Updated 4 years ago
- An adversarial robustness evaluation library on face recognition.☆113Updated 2 years ago
- Temporary Discriminator GAN☆14Updated 5 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Updated 5 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Updated 6 years ago
- Tensorflow implementation of "Defense against Universal Adversarial Perturbations"☆10Updated 7 years ago
- [ICLR 2021 Spotlight Oral] "Undistillable: Making A Nasty Teacher That CANNOT teach students", Haoyu Ma, Tianlong Chen, Ting-Kuei Hu, Che…☆82Updated 3 years ago
- [CVPR2020] Clean-Label Backdoor Attacks on Video Recognition Models☆40Updated 5 years ago
- (IJCAI 2019) Knowledge Amalgamation from Heterogeneous Networks by Common Feature Learning☆10Updated 2 years ago
- ☆13Updated 3 years ago
- A novel data-free model stealing method based on GAN☆131Updated 3 years ago
- ☆23Updated 6 years ago
- 🔬 Some personal research code on analyzing CNNs. Started with a thorough exploration of Stanford's Tiny-Imagenet-200 dataset.☆105Updated 6 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Updated 6 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆17Updated 4 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Updated 3 years ago
- [NeurIPS'21] "AugMax: Adversarial Composition of Random Augmentations for Robust Training" by Haotao Wang, Chaowei Xiao, Jean Kossaifi, Z…☆125Updated 3 years ago