mahmoods01 / agnsView external linksLinks
Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with Objectives." In ACM TOPS, 2019.
☆37Sep 19, 2020Updated 5 years ago
Alternatives and similar repositories for agns
Users that are interested in agns are comparing it to the libraries listed below
Sorting:
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 6 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- some baseline attack method by pytorch☆11Oct 13, 2021Updated 4 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 5 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- Reproduces BPDA attack in pytorch☆13Oct 10, 2019Updated 6 years ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆337Feb 18, 2021Updated 4 years ago
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆18Jul 5, 2022Updated 3 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- CAAD 2018 winning submissions☆35Feb 10, 2019Updated 7 years ago
- Original PyTorch implementation of the AdversarialMask paper☆22Apr 16, 2023Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- ☆22Sep 13, 2021Updated 4 years ago
- ☆22Nov 19, 2021Updated 4 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Jan 25, 2022Updated 4 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆61May 14, 2019Updated 6 years ago
- OpenPose: A Real-Time Multi-Person Keypoint Detection And Multi-Threading C++ Library☆12Jul 13, 2017Updated 8 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆27Jan 6, 2022Updated 4 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)☆34Aug 18, 2021Updated 4 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆87Jun 9, 2022Updated 3 years ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago
- ☆41Mar 11, 2022Updated 3 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Feb 18, 2021Updated 4 years ago
- Corresponding code to "FACESEC: A Fine-grained Robustness Evaluation Framework for Face Recognition Systems" @ CVPR 2021☆13Jun 22, 2021Updated 4 years ago
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- ☆25Jul 9, 2025Updated 7 months ago
- Awesome-Adversarial-Attack-Methods-Summary☆12Jul 24, 2024Updated last year
- Reproduce the paper Distributed Representations of Sentences and Documents in tensorflow☆14Apr 8, 2017Updated 8 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- Accompanying source code to my Bachelor's thesis at TUHH☆11Mar 15, 2018Updated 7 years ago
- ☆10Oct 13, 2022Updated 3 years ago
- A fine multimodality fusion network :)☆11Aug 9, 2021Updated 4 years ago
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated last year
- Code for the paper: Graph Jigsaw Learning for Cartoon Face Recognition☆10Jul 1, 2022Updated 3 years ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Jan 23, 2018Updated 8 years ago