Generating Adversarial Images for Image-to-Image models in Pytorch
☆18Feb 10, 2020Updated 6 years ago
Alternatives and similar repositories for Adversarial-Attack-CycleGAN-and-pix2pix
Users that are interested in Adversarial-Attack-CycleGAN-and-pix2pix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆39Jun 14, 2023Updated 2 years ago
- 생활 자체를 오픈소스화 하기, 생활이 하나의 게임이고 퀘스트라 보자☆10Jun 24, 2019Updated 6 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- Boilerplate written in ES6 for building scalable, reactive applications.☆12Dec 23, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🔥🔥Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networks☆347May 7, 2020Updated 5 years ago
- Ask QUESTIONS here. MinnowBoard.org issue and get help submission. See README for use.☆14Feb 8, 2017Updated 9 years ago
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆109May 6, 2024Updated last year
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- ☆19Jan 10, 2024Updated 2 years ago
- Multilanguage support for react applications☆16Mar 4, 2023Updated 3 years ago
- ☆47Nov 17, 2022Updated 3 years ago
- ☆18Feb 16, 2023Updated 3 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆31May 4, 2022Updated 3 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Dec 29, 2021Updated 4 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- Repository contains Google colab notebooks used for faceswaping☆30Dec 10, 2019Updated 6 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆45Mar 24, 2023Updated 3 years ago
- Learn to Synthesize and Synthesize to Learn☆14Sep 3, 2018Updated 7 years ago
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆22Oct 29, 2025Updated 5 months ago
- The official PyTorch implementations for Latent-HSJA.☆29Nov 3, 2023Updated 2 years ago
- MRLReID:Unconstrained Cross-resolution Person Re-identification with Multi-task Resolution Learning☆13Aug 1, 2023Updated 2 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- ☆14Dec 31, 2024Updated last year
- ☆10Oct 18, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- MultipleStyleCheckBoxKit have multiple style check box, due with multiple line text, network photo, local photo, useful on news vote. …☆17Mar 16, 2016Updated 10 years ago
- ☆11May 30, 2024Updated last year
- ☆11Oct 30, 2024Updated last year
- Official Implementation of Harnessing Perceptual Adversarial Patches for Crowd Counting (ACM CCS)☆18Apr 28, 2023Updated 2 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆98Dec 12, 2020Updated 5 years ago