jtrpinto / SecureTLLinks
Code for the Secure Triplet Loss approach for biometric template security.
☆10Updated 4 years ago
Alternatives and similar repositories for SecureTL
Users that are interested in SecureTL are comparing it to the libraries listed below
Sorting:
- Implementation of the local and global unlinkability metrics for biometric template protection systems☆20Updated 6 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆11Updated 4 years ago
- Official Implementation of the CVPR'20 paper 'Π-nets: Deep Polynomial Neural Networks' and its T-PAMI-21 extension.☆177Updated 3 years ago
- Implementation of 'A Watermark for Large Language Models' paper by Kirchenbauer & Geiping et. al.☆24Updated 2 years ago
- MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders☆19Updated 2 years ago
- Official repository of the paper Privacy-friendly Synthetic Data for the Development of Face Morphing Attack Detectors☆20Updated 2 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Updated 5 years ago
- Recycling diverse models☆46Updated 3 years ago
- ☆26Updated last year
- [NeurIPS'21] "AugMax: Adversarial Composition of Random Augmentations for Robust Training" by Haotao Wang, Chaowei Xiao, Jean Kossaifi, Z…☆125Updated 4 years ago
- ☆15Updated 11 months ago
- ☆37Updated 3 years ago
- ☆17Updated 2 years ago
- Contains notebooks for the PAR tutorial at CVPR 2021.☆36Updated 4 years ago
- ☆47Updated 4 years ago
- ☆14Updated 5 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 3 years ago
- MiDeCon: Minutia Detection Confidence for Unsupervised and Accurate Minutia and Fingerprint Quality Assessment☆24Updated last year
- ☆12Updated 2 years ago
- ☆24Updated 4 years ago
- ☆75Updated 3 years ago
- Code for paper: "Privately generating tabular data using language models".☆15Updated 2 years ago
- Source code of "Deep Rank Hashing Network for Cancellable Face Identification"☆12Updated 3 years ago
- The official PyTorch implementation - Can Neural Nets Learn the Same Model Twice? Investigating Reproducibility and Double Descent from t…☆83Updated 3 years ago
- A database of over 1.4 billion 3x3 convolution filters extracted from hundreds of diverse CNN models with relevant meta information (CVPR…☆34Updated 2 years ago
- Code release for REPAIR: REnormalizing Permuted Activations for Interpolation Repair☆52Updated 2 years ago
- (ICLR 2023 Spotlight) MPCFormer: fast, performant, and private transformer inference with MPC☆102Updated 2 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆15Updated 3 years ago
- Latest Weight Averaging (NeurIPS HITY 2022)☆32Updated 2 years ago
- Re-implementation of the StylEx paper, training a GAN to explain a classifier in StyleSpace, paper by Lang et al. (2021).☆38Updated 2 years ago