(2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition
☆10Oct 18, 2025Updated 5 months ago
Alternatives and similar repositories for CanFG
Users that are interested in CanFG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Dec 31, 2023Updated 2 years ago
- Official PyTorch Implementation for G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors (TIFS-2024)☆17Aug 27, 2024Updated last year
- About face technology☆20Feb 9, 2023Updated 3 years ago
- Author implementation of RiDDLE: Reversible and Diversified De-identification with Latent Encryptor (CVPR 2023)☆51Jul 3, 2025Updated 8 months ago
- Matlab code for the paper "Representing noisy image without denoising"☆10Jan 21, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simplified implementation of the fuzzy vault algorithm for biometric data☆24Dec 25, 2014Updated 11 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- ☆22Apr 7, 2025Updated 11 months ago
- 空域明文可逆信息隐藏☆11Jul 6, 2020Updated 5 years ago
- Matlab source code for Experience and Reputation models in the Trust Platform☆12Apr 11, 2017Updated 8 years ago
- Trust Management for Vehicular Networks☆11Aug 6, 2025Updated 7 months ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Dec 27, 2023Updated 2 years ago
- Blockchain Based Approach for Trust Management in Intelligent Transportation Systems with Smart Contracts☆13Jul 19, 2022Updated 3 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Continuous Benchmark for cache libraries written in golang.☆12Mar 26, 2023Updated 3 years ago
- Deploying TensorFlow model with Django☆12Jun 27, 2022Updated 3 years ago
- 全国大学生信息安全竞赛作品赛报告参考模板(LaTex)☆16Oct 4, 2024Updated last year
- 基于中文社交媒体谣言数据集,构建了一个自动检测虚假新闻的机器学习系统。系统能够通过分析微博文本内容及其传播特征,有效识别潜在的虚假信息,为社交媒体平台的内容审核和用户提供有力的信息甄别支持。☆25Jun 22, 2025Updated 9 months ago
- Blockchain reputation-based trust management system☆17Jul 14, 2019Updated 6 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- IoV Reputation Mechanism simulation using SUMO, OMNETPP and VEINS.☆17Aug 8, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Updated this week
- Trust management model in IoT☆16Oct 11, 2021Updated 4 years ago
- Implementation of a Siamese Neural Network (in Tensorflow) that defines a similarity score between a pair of person images.☆12Sep 25, 2020Updated 5 years ago
- (CVPR 2024) Uniformity and Variance for Heterogeneous Federated Learning☆11Mar 6, 2024Updated 2 years ago
- [NeurIPS2024] Official Codes of the Paper "Gradient Guidance for Diffusion Models: An Optimization Perspective"☆25Mar 21, 2025Updated last year
- ☆10Nov 22, 2022Updated 3 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- 这是一个基于Vue3的现代化AI聊天应用。☆19Aug 8, 2025Updated 7 months ago
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆18May 10, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Jul 18, 2023Updated 2 years ago
- Matlab code for the paper "A survey of orthogonal moments for image representation: Theory, implementation, and evaluation"☆30Nov 25, 2021Updated 4 years ago
- [ECCVW 2024 -- ORAL] Official repository of paper titled "Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors".☆12Oct 11, 2024Updated last year
- LenslessFace : An End-to-End Optimized Lensless System for Privacy-Preserving Face Verification☆22Jul 21, 2024Updated last year
- This repository provides code for the paper ---- On Universal Black-Box Domain Adaptation.☆10Sep 2, 2021Updated 4 years ago
- A trust inference model on the hyperledger that is attack proof for communication in ephemeral networks such as vehicular adhoc networks …☆17Sep 4, 2020Updated 5 years ago
- The code for ACM MM2024 (Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning)☆15Jul 18, 2024Updated last year