ixiaoyu-tech / xiaoyu-projectLinks
☆13Updated 4 years ago
Alternatives and similar repositories for xiaoyu-project
Users that are interested in xiaoyu-project are comparing it to the libraries listed below
Sorting:
- Can audio-visual integration strengthen robustness under multimodal attacks?☆28Updated 3 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆28Updated 2 years ago
- Adversarial attack and defense strategies for deep speaker recognition systems☆42Updated 4 years ago
- code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"☆23Updated 5 years ago
- Code for "Neuron Shapley: Discovering the Responsible Neurons"☆27Updated last year
- ☆11Updated 3 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆35Updated 3 years ago
- code for paper "learning to fool the speaker recognition"☆10Updated 5 years ago
- A pytorch implementation of MFCC.☆33Updated 3 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Updated 4 years ago
- ☆19Updated 4 years ago
- Pytorch implementation of Adversarially Robust Distillation (ARD)☆59Updated 6 years ago
- Code for NeurIPS 2019 Paper☆48Updated 5 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28Updated 2 years ago
- ☆19Updated 3 years ago
- ☆19Updated 4 years ago
- A Backdoor Attack against 3D Point Cloud Classifiers (ICCV2021)☆19Updated 4 years ago
- The code for AAAI2023 (Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization)☆13Updated 3 years ago
- Metric Learning (npair loss & angular loss) on mnist and Visualizing by t_SNE☆35Updated 2 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 4 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆105Updated 3 years ago
- A Self-Consistent Robust Error (ICML 2022)☆69Updated 2 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆17Updated 3 years ago
- ☆35Updated 5 years ago
- ☆20Updated 3 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Updated 5 years ago
- ☆18Updated 4 years ago
- PyTorch implementation of DUL (Data Uncertainty Learning in Face Recognition, CVPR2020)☆38Updated 2 years ago
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆29Updated 3 years ago
- ☆14Updated 5 years ago