MCS 2018. Adversarial Attacks on Black Box Face Recognition
☆16Jul 19, 2018Updated 7 years ago
Alternatives and similar repositories for mcs_2018_adversarial_attack
Users that are interested in mcs_2018_adversarial_attack are comparing it to the libraries listed below
Sorting:
- ☆43Jul 27, 2021Updated 4 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Oct 1, 2019Updated 6 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆416Jul 6, 2021Updated 4 years ago
- Low-Resolution Face Recognition Based on Identity-Preserved Face Hallucination (2019, ICIP)☆19Jun 4, 2023Updated 2 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- Reproduce multiple adversarial attack methods☆21May 5, 2020Updated 5 years ago
- Codes for reproducing the white-box adversarial attacks in “EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples,” …☆21Sep 22, 2018Updated 7 years ago
- Solution to Deepfake Detection Challenge☆27Jun 22, 2022Updated 3 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- NIPS 2017 - Adversarial Learning☆35Dec 4, 2017Updated 8 years ago
- Building a verification system based on the finger vein image is a hard problem since it goes through many steps including vein detection…☆10Jan 6, 2020Updated 6 years ago
- Dataset created for the Power Line Insulators Inspection Detections☆10Jul 2, 2020Updated 5 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆46Aug 12, 2023Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)☆34Aug 18, 2021Updated 4 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- Emotion Recognition☆10Oct 22, 2017Updated 8 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 6 years ago
- ☆12Nov 22, 2022Updated 3 years ago
- [WACV 2023] Temporal Feature Enhancement Dilated Convolution Network for Weakly-supervised Temporal Action Localization☆13Mar 9, 2024Updated last year
- Delving into the Continuous Domain Adaptation (ACM MM22)☆12Jul 10, 2022Updated 3 years ago
- Evaluation; object detection; AP; precision; Recall; MAP; ROC☆13Jul 5, 2019Updated 6 years ago
- ☆10Nov 21, 2020Updated 5 years ago
- ☆19May 14, 2025Updated 9 months ago
- Graph Convolutional Module for Temporal Action Localization in Videos☆10Jul 4, 2020Updated 5 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- Official implementation of "Diffusion models meet image counter-forensics"☆11Jan 22, 2024Updated 2 years ago
- Learning Generalized Spoof Cues for FaceAnti-spoofing reimplementation in pytorch☆39Jul 25, 2024Updated last year
- Physical adversarial attack for fooling the Faster R-CNN object detector☆167Jan 13, 2020Updated 6 years ago
- QDL-CMFD: a Quality-independent and Deep Learning-based Copy-Move image Forgery Detection method.☆13Nov 19, 2023Updated 2 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- ☆10Nov 10, 2022Updated 3 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- ☆12Oct 6, 2022Updated 3 years ago