bwtseng / Compressive-Privacy-Generative-Adversarial-NetworkLinks
This repository includes all implementations about the experiments mentioned in our published manuscript. If there has any problems, please be free to contact us! Thank You.
☆13Updated 5 years ago
Alternatives and similar repositories for Compressive-Privacy-Generative-Adversarial-Network
Users that are interested in Compressive-Privacy-Generative-Adversarial-Network are comparing it to the libraries listed below
Sorting:
- ☆41Updated 3 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 5 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆36Updated 4 years ago
- A PyTorch implementation of Grad-CAM based on ICCV 2017 paper "Grad-CAM: Visual Explanations from Deep Networks via Gradient-based Local…☆59Updated 7 years ago
- ☆43Updated 4 years ago
- (IJCAI 2019) Knowledge Amalgamation from Heterogeneous Networks by Common Feature Learning☆10Updated 2 years ago
- PyTorch implementation of "Feature Denoising for Improving Adversarial Robustness" on CIFAR10.☆35Updated 5 years ago
- ☆13Updated 3 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Updated 5 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆45Updated 4 years ago
- Face recognition with loss of softmax, sphereface, cosface, arcface in pytorch of python3☆10Updated 5 years ago
- ☆29Updated 4 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Updated 2 years ago
- Code for paper 'FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis'☆32Updated 2 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Updated 3 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Updated 5 years ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Updated 4 years ago
- [ECCV 2020] Pytorch codes for Open-set Adversarial Defense☆23Updated 3 years ago
- Example code of [Tianchi AAAI2022 Security AI Challenger Program Phase 8]☆22Updated 3 years ago
- An adversarial robustness evaluation library on face recognition.☆111Updated 2 years ago
- Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》☆30Updated 5 years ago
- A novel data-free model stealing method based on GAN☆128Updated 2 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆58Updated 4 years ago
- IJCV22 Attack your retrieval model via Query! They are not robust as you expected!☆47Updated 2 years ago
- A Person Re-identification Data Augmentation Method with Adversarial Defense Effect☆22Updated last year
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 6 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- [NeurIPS-2021] Mosaicking to Distill: Knowledge Distillation from Out-of-Domain Data☆45Updated 2 years ago
- [CVPR 2019] Pytorch codes for Multi-adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection☆84Updated 5 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 7 years ago