edosedgar / mtcnnattackLinks
The first real-world adversarial attack on MTCNN face detetction system to date
☆71Updated 4 years ago
Alternatives and similar repositories for mtcnnattack
Users that are interested in mtcnnattack are comparing it to the libraries listed below
Sorting:
- Deflecting Adversarial Attacks with Pixel Deflection☆71Updated 7 years ago
- Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》☆30Updated 6 years ago
- ☆66Updated 7 years ago
- Robustness vs Accuracy Survey on ImageNet☆99Updated 4 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Updated 6 years ago
- A collection of methods to fool the deep neural network☆76Updated last year
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Updated 6 years ago
- Explainable Face Recognition ECCV 2020 Paper code and dataset repository☆64Updated 4 years ago
- Deep Face Recognition in PyTorch☆152Updated 6 years ago
- Data independent universal adversarial perturbations☆63Updated 5 years ago
- A fast sparse attack on deep neural networks.☆51Updated 5 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆27Updated 4 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 7 years ago
- The unofficial https://deepfakedetectionchallenge.ai/ github repo. A quick and easy way to get insight to current progress and previous w…☆89Updated 6 years ago
- ☆17Updated 6 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆15Updated 5 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 7 years ago
- Training a ResNet on UMDFaces for face recognition☆138Updated 7 years ago
- Official PyTorch implementation of "Visualizing the Decision-making Process in Deep Neural Decision Forest", CVPR 2019 Workshops on Expla…☆72Updated 3 years ago
- Notebooks for reproducing the paper "Computer Vision with a Single (Robust) Classifier"☆129Updated 6 years ago
- This is a pytorch implementation of the CVPR2020 paper: Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-id…☆96Updated 4 years ago
- Paper: Towards Open-Set Face Recognition using Hashing Functions (IJCB'17)☆13Updated 6 years ago
- Code, data and benchmark from the paper "Benchmarking Robustness in Object Detection: Autonomous Driving when Winter is Coming" (NeurIPS …☆191Updated 6 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 7 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆127Updated 7 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆167Updated 5 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Updated 5 years ago
- An adversarial robustness evaluation library on face recognition.☆114Updated 2 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Updated 6 years ago
- ReshapeGAN: Object Reshaping by Providing A Single Reference Image☆40Updated 6 years ago