daizigege / CanFGView external linksLinks
(2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition
☆10Oct 18, 2025Updated 3 months ago
Alternatives and similar repositories for CanFG
Users that are interested in CanFG are comparing it to the libraries listed below
Sorting:
- ☆18Dec 31, 2023Updated 2 years ago
- Official PyTorch Implementation for G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors (TIFS-2024)☆16Aug 27, 2024Updated last year
- About face technology☆20Feb 9, 2023Updated 3 years ago
- Author implementation of RiDDLE: Reversible and Diversified De-identification with Latent Encryptor (CVPR 2023)☆48Jul 3, 2025Updated 7 months ago
- A simplified implementation of the fuzzy vault algorithm for biometric data☆24Dec 25, 2014Updated 11 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- paper爬取+多agent分析(Polaris)☆25Jan 5, 2026Updated last month
- 读取word文档内容,生成手写字体图片☆12Jan 8, 2023Updated 3 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Dec 27, 2023Updated 2 years ago
- Continuous Benchmark for cache libraries written in golang.☆12Mar 26, 2023Updated 2 years ago
- (CVPR 2024) Uniformity and Variance for Heterogeneous Federated Learning☆11Mar 6, 2024Updated last year
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆11Dec 20, 2021Updated 4 years ago
- Unofficial code for SENetV2 using torch and tensorflow☆10Dec 5, 2023Updated 2 years ago
- 全国大学生信息安全竞赛作品赛报告参考模板(LaTex)☆15Oct 4, 2024Updated last year
- Matlab code for the paper "Representing noisy image without denoising"☆10Jan 21, 2023Updated 3 years ago
- Matlab source code for Experience and Reputation models in the Trust Platform☆12Apr 11, 2017Updated 8 years ago
- 空域明文可逆信息隐藏☆11Jul 6, 2020Updated 5 years ago
- [CVPR 2023] Official repository of paper titled "CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent …☆102Mar 25, 2024Updated last year
- ☆10Nov 22, 2022Updated 3 years ago
- Implementation of SoftSpokenOT. Forked from libOTe.☆10May 6, 2024Updated last year
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 5 years ago
- Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics☆12Nov 20, 2024Updated last year
- 这是一个基于Vue3的现代化AI聊天应用。☆19Aug 8, 2025Updated 6 months ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- tiny-redis☆11Nov 22, 2025Updated 2 months ago
- Give asset image in hexo a absolutely path automatically☆10May 22, 2019Updated 6 years ago
- Trust Management for Vehicular Networks☆11Aug 6, 2025Updated 6 months ago
- 2-party 1-bit Distributed Point Function for PIR read and/or write☆12Mar 19, 2021Updated 4 years ago
- Code for Visual Information Hiding Based on Obfuscating Adversarial Perturbations☆13Jan 9, 2024Updated 2 years ago
- Implementation of a Siamese Neural Network (in Tensorflow) that defines a similarity score between a pair of person images.☆12Sep 25, 2020Updated 5 years ago
- Deploying TensorFlow model with Django☆12Jun 27, 2022Updated 3 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Dec 12, 2024Updated last year
- The official implantation of SGPT (CVPR2024)☆17Jul 15, 2024Updated last year
- Improved Constructions for Distributed Multi-Point Functions - accepted to IEEE S&P 2025☆17Sep 24, 2025Updated 4 months ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago
- This repository provides code for the paper ---- On Universal Black-Box Domain Adaptation.☆10Sep 2, 2021Updated 4 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- Blockchain Based Approach for Trust Management in Intelligent Transportation Systems with Smart Contracts☆13Jul 19, 2022Updated 3 years ago