edosedgar / mtcnnattackLinks
The first real-world adversarial attack on MTCNN face detetction system to date
☆72Updated 4 years ago
Alternatives and similar repositories for mtcnnattack
Users that are interested in mtcnnattack are comparing it to the libraries listed below
Sorting:
- Deflecting Adversarial Attacks with Pixel Deflection☆71Updated 7 years ago
- Data independent universal adversarial perturbations☆63Updated 5 years ago
- ☆66Updated 7 years ago
- Robustness vs Accuracy Survey on ImageNet☆99Updated 4 years ago
- A collection of methods to fool the deep neural network☆76Updated last year
- Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》☆30Updated 6 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆27Updated 3 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Updated 6 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Updated 6 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆167Updated 5 years ago
- A fast sparse attack on deep neural networks.☆51Updated 5 years ago
- Explainable Face Recognition ECCV 2020 Paper code and dataset repository☆64Updated 4 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 7 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 7 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Updated 5 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 7 years ago
- Training a ResNet on UMDFaces for face recognition☆138Updated 7 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆127Updated 7 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Updated 6 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Updated 6 years ago
- An adversarial robustness evaluation library on face recognition.☆113Updated 2 years ago
- Official PyTorch implementation of "Visualizing the Decision-making Process in Deep Neural Decision Forest", CVPR 2019 Workshops on Expla…☆71Updated 3 years ago
- Deep Face Recognition in PyTorch☆153Updated 6 years ago
- Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective, ICCV'17☆30Updated 7 years ago
- This is a pytorch implementation of the CVPR2020 paper: Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-id…☆96Updated 4 years ago
- Investigating the robustness of state-of-the-art CNN architectures to simple spatial transformations.☆49Updated 6 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Updated 7 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Updated 3 years ago
- Countering Adversarial Image using Input Transformations.☆497Updated 4 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆15Updated 5 years ago