☆10Nov 8, 2021Updated 4 years ago
Alternatives and similar repositories for MIAIS
Users that are interested in MIAIS are comparing it to the libraries listed below
Sorting:
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- ☆18Dec 31, 2023Updated 2 years ago
- ☆18Feb 16, 2023Updated 3 years ago
- Probabilistic Jacobian-based Saliency Maps Attacks☆19Nov 28, 2020Updated 5 years ago
- Semantic Segmentation Network based on ResNet38☆21Mar 25, 2021Updated 4 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- Learning a grayscale image that can be fully restored to its orignal color version.☆25Jan 18, 2022Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- The PyTorch implementation of our paper "Password-conditioned Anonymization and Deanonymization with Face Identity Transformers" in ECCV …☆34Mar 4, 2021Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago
- ☆17Feb 6, 2024Updated 2 years ago
- BBO optimiser☆11Feb 11, 2020Updated 6 years ago
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆37Feb 11, 2018Updated 8 years ago
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated last year
- ☆10Jun 24, 2021Updated 4 years ago
- ☆10May 14, 2023Updated 2 years ago
- Reproduce the paper Distributed Representations of Sentences and Documents in tensorflow☆14Apr 8, 2017Updated 8 years ago
- Official code release for Deep Extreme Mixture Model by Wilson, McDonald, Galib, Tan, and Luo.☆10Feb 11, 2022Updated 4 years ago
- Open-source strong baseline for domain generlization re-ID. We will udpate the strong baseline and CFD method~☆10Nov 30, 2021Updated 4 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- Differentiable color conversion functions for pytorch☆11Nov 8, 2019Updated 6 years ago
- ☆47Feb 21, 2020Updated 6 years ago
- ☆51Jan 17, 2023Updated 3 years ago
- HiDDeN: Hiding Data with Deep Networks.☆104Dec 12, 2018Updated 7 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- ☆11Apr 3, 2020Updated 5 years ago
- SImple Tensorflow implementations of " Image-to-Image Translation with Conditional Adversarial Networks" (CVPR 2017)☆10Apr 11, 2018Updated 7 years ago
- ☆52Feb 24, 2024Updated 2 years ago
- (IJCAI 2019) Knowledge Amalgamation from Heterogeneous Networks by Common Feature Learning☆10Nov 25, 2022Updated 3 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- ☆15Oct 21, 2021Updated 4 years ago
- Implementation of "Deep Learning Hierarchical Representation for Image Steganalysis" by TensorFlow☆11Mar 10, 2018Updated 7 years ago
- 根据论文:"Minimum Barrier Salient Object Detection At 80 FPS"给出的matlab代码,使用c++重写的。 The c++ implementation on "Minimum Barrier Salient Object …☆10Dec 4, 2016Updated 9 years ago
- Robust Camera Trace Extraction (TIFS'23)☆12Oct 3, 2023Updated 2 years ago
- Deep Steganalysis training script☆13May 1, 2025Updated 10 months ago
- Establishing Robust Generative Image Steganography via Popular Stable Diffusion☆55Dec 26, 2024Updated last year