ffeiDing / Face_RecognitionLinks
Face recognition with loss of softmax, sphereface, cosface, arcface in pytorch of python3
☆10Updated 5 years ago
Alternatives and similar repositories for Face_Recognition
Users that are interested in Face_Recognition are comparing it to the libraries listed below
Sorting:
- ☆41Updated 3 years ago
- Pytorch implementation of mainstream face recognition algorithms(ArcFace, CosFace).☆104Updated 5 years ago
- Implementation of Conv-based and Vit-based networks designed for CIFAR.☆70Updated 2 years ago
- ☆43Updated 4 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Updated 3 years ago
- An adversarial robustness evaluation library on face recognition.☆113Updated 2 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆91Updated 2 years ago
- ☆12Updated 3 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Updated 6 years ago
- Code for Paper "Self-Distillation from the Last Mini-Batch for Consistency Regularization"☆43Updated 3 years ago
- The implementation of AAAI 2021 Paper: "Progressive Network Grafting for Few-Shot Knowledge Distillation".☆34Updated last year
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Updated 3 years ago
- [NeurIPS'2019] Shupeng Gui, Haotao Wang, Haichuan Yang, Chen Yu, Zhangyang Wang, Ji Liu, “Model Compression with Adversarial Robustness: …☆49Updated 3 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Updated 5 years ago
- ☆13Updated 3 years ago
- PyTorch implementation of "Distilling the Knowledge in a Neural Network"☆65Updated 3 years ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22Updated 3 years ago
- ☆42Updated 5 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Updated 3 years ago
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Updated 3 years ago
- A novel data-free model stealing method based on GAN☆133Updated 3 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Updated 4 years ago
- Deep Learning fingerprint recognition using PyTorch☆15Updated 3 years ago
- This repository contains the PyTorch implementation of Zeroth Order Optimization Based Adversarial Black Box Attack (https://arxiv.org/ab…☆44Updated 2 years ago
- Auto-Prox-AAAI24☆14Updated last year
- This repository is a curated list of papers and open source code about competition for CV Adversarial Attack.☆27Updated 2 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 5 years ago
- This repository includes all implementations about the experiments mentioned in our published manuscript. If there has any problems, plea…