Adversarial Generative Network (AGN) implementation in PyTorch
☆33Feb 3, 2021Updated 5 years ago
Alternatives and similar repositories for AGN-pytorch
Users that are interested in AGN-pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆36Sep 19, 2020Updated 5 years ago
- ☆14Oct 27, 2021Updated 4 years ago
- ☆13Jan 12, 2021Updated 5 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- Original PyTorch implementation of the AdversarialMask paper☆22Apr 16, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆63Aug 31, 2021Updated 4 years ago
- A Confidential Computing-Aware Certificate Authority☆11Nov 22, 2025Updated 4 months ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- ☆43Jan 25, 2024Updated 2 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- ☆27Jul 9, 2025Updated 8 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Applied_AI_O persional☆11Mar 15, 2026Updated 2 weeks ago
- The first real-world adversarial attack on MTCNN face detetction system to date☆71May 27, 2021Updated 4 years ago
- ☆43May 21, 2020Updated 5 years ago
- Corresponding code to "FACESEC: A Fine-grained Robustness Evaluation Framework for Face Recognition Systems" @ CVPR 2021☆13Jun 22, 2021Updated 4 years ago
- some baseline attack method by pytorch☆11Oct 13, 2021Updated 4 years ago
- Research and experimental code related to Opacus, an open-source library for training PyTorch models with Differential Privacy☆18Oct 9, 2024Updated last year
- Generative label fused network for image–text matching☆10Jan 13, 2023Updated 3 years ago
- ICCV 2021☆32Oct 6, 2021Updated 4 years ago
- Official TensorFlow implementation of GAN-based priors for quantifying uncertainty.☆13Nov 13, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository demonstrates the application of our proposed task-free continual learning method on a synthetic experiment.☆13Jun 24, 2019Updated 6 years ago
- Code for the paper titled "Generalized Depthwise-Separable Convolutions for Adversarially Robust and Efficient Neural Networks" (NeurIPS…☆11Jan 7, 2022Updated 4 years ago
- Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks☆13Feb 15, 2022Updated 4 years ago
- ☆19Jun 26, 2021Updated 4 years ago
- ☆18Nov 3, 2022Updated 3 years ago
- This is the implementation of Autonomous Deep Learning on python☆12Jul 21, 2020Updated 5 years ago
- ☆18Feb 16, 2023Updated 3 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- Bench4KE, a benchmarking system for knowledge engineering automation tasks.☆14Jan 26, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SSM+layui+Echarts 医药管理系统☆11Aug 26, 2024Updated last year
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- Artefacts for: "VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud Environments"☆38Oct 17, 2025Updated 5 months ago
- Hands-on tutorial on adversarial examples 😈. With Streamlit app ❤️.☆32Jun 17, 2022Updated 3 years ago
- Experimental code for the ICRA20 paper: Image-Based Place Recognition on Bucolic Environment Across Seasons From Semantic Edge Descriptio…☆16Oct 26, 2019Updated 6 years ago
- Formulario para los concursos docentes en Exactas UBA☆10Sep 6, 2024Updated last year
- The notebooks used to demonstrate the blog post about Interpretability in ML☆12Dec 7, 2019Updated 6 years ago