ffeiDing / Face_RecognitionLinks
Face recognition with loss of softmax, sphereface, cosface, arcface in pytorch of python3
☆10Updated 5 years ago
Alternatives and similar repositories for Face_Recognition
Users that are interested in Face_Recognition are comparing it to the libraries listed below
Sorting:
- ☆41Updated 3 years ago
- This repository includes all implementations about the experiments mentioned in our published manuscript. If there has any problems, plea…☆13Updated 5 years ago
- ☆13Updated 3 years ago
- Pytorch implementation of mainstream face recognition algorithms(ArcFace, CosFace).☆102Updated 4 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 5 years ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22Updated 3 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆76Updated 2 years ago
- ☆27Updated 2 years ago
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Updated 3 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Updated 3 years ago
- Implementation of Conv-based and Vit-based networks designed for CIFAR.☆70Updated 2 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆88Updated 2 years ago
- An adversarial robustness evaluation library on face recognition.☆111Updated 2 years ago
- Deep Learning fingerprint recognition using PyTorch☆14Updated 3 years ago
- Data-Free Network Quantization With Adversarial Knowledge Distillation PyTorch☆30Updated 3 years ago
- ☆29Updated 4 years ago
- Code for Paper "Self-Distillation from the Last Mini-Batch for Consistency Regularization"☆41Updated 2 years ago
- ☆43Updated 4 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆36Updated 4 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Updated 3 years ago
- S2-BNN: Bridging the Gap Between Self-Supervised Real and 1-bit Neural Networks via Guided Distribution Calibration (CVPR 2021)☆64Updated 3 years ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Updated 3 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- Auto-Prox-AAAI24☆13Updated last year
- [NeurIPS'2019] Shupeng Gui, Haotao Wang, Haichuan Yang, Chen Yu, Zhangyang Wang, Ji Liu, “Model Compression with Adversarial Robustness: …☆50Updated 3 years ago
- Data-Efficient Backdoor Attacks☆18Updated 3 years ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Updated 4 years ago
- ☆10Updated 3 years ago
- [IJCAI-2021] Contrastive Model Inversion for Data-Free Knowledge Distillation☆72Updated 3 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆75Updated 3 years ago