MCS 2018. Adversarial Attacks on Black Box Face Recognition
☆16Jul 19, 2018Updated 7 years ago
Alternatives and similar repositories for mcs_2018_adversarial_attack
Users that are interested in mcs_2018_adversarial_attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆43Jul 27, 2021Updated 4 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Oct 1, 2019Updated 6 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Black-Box Adversarial Attack on Public Face Recognition Systems☆416Jul 6, 2021Updated 4 years ago
- Reproduce multiple adversarial attack methods☆21May 5, 2020Updated 6 years ago
- Low-Resolution Face Recognition Based on Identity-Preserved Face Hallucination (2019, ICIP)☆19Jun 4, 2023Updated 2 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- ☆17Feb 25, 2019Updated 7 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆338Feb 18, 2021Updated 5 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)☆34Aug 18, 2021Updated 4 years ago
- NIPS 2017 - Adversarial Learning☆35Dec 4, 2017Updated 8 years ago
- The first real-world adversarial attack on MTCNN face detetction system to date☆72May 27, 2021Updated 4 years ago
- Emotion Recognition☆10Oct 22, 2017Updated 8 years ago
- ☆43May 21, 2020Updated 6 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 7 years ago
- Codes for reproducing the white-box adversarial attacks in “EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples,” …☆21Sep 22, 2018Updated 7 years ago
- Assignment codes for CS736 Algorithms for Medical Image Processing.☆10Aug 10, 2016Updated 9 years ago
- Solution to Deepfake Detection Challenge☆27Jun 22, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Implementation of a Siamese Neural Network (in Tensorflow) that defines a similarity score between a pair of person images.☆12Sep 25, 2020Updated 5 years ago
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Jul 18, 2023Updated 2 years ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- [ECCVW 2024 -- ORAL] Official repository of paper titled "Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors".☆12Oct 11, 2024Updated last year
- Course projects and related materials☆10Apr 6, 2017Updated 9 years ago
- Repo for our Paper: Cross Quality LFW: A database for Analyzing Cross-Resolution Image Face Recognition in Unconstrained Environments☆19Nov 25, 2022Updated 3 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- Invariant Feature Regularization for Fair Face Recognition (ICCV'23)☆15Oct 23, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Archive for my CNN model for diabetic kaggle competition☆12Aug 1, 2015Updated 10 years ago
- ☆18Oct 12, 2022Updated 3 years ago
- (2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition☆10Apr 3, 2026Updated last month
- Paper sharing in adversary related works☆46Apr 24, 2026Updated 3 weeks ago
- Building a verification system based on the finger vein image is a hard problem since it goes through many steps including vein detection…☆10Jan 6, 2020Updated 6 years ago
- Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"☆11Nov 29, 2021Updated 4 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago