Generating Adversarial Images for Image-to-Image models in Pytorch
☆18Feb 10, 2020Updated 6 years ago
Alternatives and similar repositories for Adversarial-Attack-CycleGAN-and-pix2pix
Users that are interested in Adversarial-Attack-CycleGAN-and-pix2pix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆108May 6, 2024Updated last year
- ☆19Jan 10, 2024Updated 2 years ago
- ☆18Feb 16, 2023Updated 3 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Dec 29, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- Simple pytorch implementation of FGSM and I-FGSM☆294Mar 21, 2018Updated 8 years ago
- ☆10Jun 2, 2024Updated last year
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- Learn to Synthesize and Synthesize to Learn☆14Sep 3, 2018Updated 7 years ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- A Pytorch implementation of CVPR'21 single center loss☆25May 11, 2021Updated 4 years ago
- A Fairness Benchmark for Face Forgery Detection☆12Apr 12, 2025Updated 11 months ago
- Paper: Dual Conditional Normalization Pyramid Network for Face Photo-Sketch Synthesis.☆15Apr 10, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Implementation for the IJCAI2021 work "Beyond the Spectrum: Detecting Deepfakes via Re-synthesis"☆36Mar 31, 2022Updated 3 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- ☆14Dec 31, 2024Updated last year
- ☆10Oct 18, 2021Updated 4 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- MultipleStyleCheckBoxKit have multiple style check box, due with multiple line text, network photo, local photo, useful on news vote. …☆17Mar 16, 2016Updated 10 years ago
- ☆11Oct 30, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆98Dec 12, 2020Updated 5 years ago
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- ☆20Jul 5, 2023Updated 2 years ago
- Improving Multiple Object Tracking via Multiple Representations based Detection Fusion and Re-tracking☆21Mar 17, 2022Updated 4 years ago
- ☆26Jul 3, 2024Updated last year
- A digital image watermarking algorithm based on combining two transforms; DWT and DCT.☆92Feb 10, 2018Updated 8 years ago
- ☆36Apr 7, 2022Updated 3 years ago
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆66Mar 8, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Robust Adversarial Network-Based End-to-End Communications System With Strong Generalization Ability Against Adversarial Attacks☆19Jan 21, 2022Updated 4 years ago
- Implementation of "Adversarial Text Generation without Reinforcement Learning"☆12Mar 13, 2019Updated 7 years ago
- [ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation☆58Dec 12, 2022Updated 3 years ago
- Detect adversarial images from intermediate features in distance space☆12Aug 22, 2018Updated 7 years ago
- My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"☆16Apr 27, 2020Updated 5 years ago
- CHAN for Image-to-Image Translation, IEEE TIP, 2021☆22Feb 19, 2021Updated 5 years ago
- using rulsif for abrupt-change detection focusing on Environment, Usage, References, Introduction, Rulsif abrupt change detection.☆10Sep 3, 2025Updated 6 months ago