ndb796 / CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch
CelebA HQ Face Identity and Attributes Recognition using PyTorch
☆32Updated last year
Alternatives and similar repositories for CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch:
Users that are interested in CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch are comparing it to the libraries listed below
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆85Updated 4 months ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆20Updated last year
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆25Updated 11 months ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆23Updated 4 years ago
- ☆25Updated 5 months ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆48Updated 3 years ago
- ☆57Updated 2 years ago
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆135Updated last year
- ☆65Updated 11 months ago
- Generating Adversarial Images for Image-to-Image models in Pytorch☆17Updated 4 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆28Updated 4 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆24Updated 3 years ago
- Official repo for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization☆12Updated 10 months ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆29Updated 2 years ago
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆35Updated 3 years ago
- ☆10Updated 2 years ago
- ☆39Updated 2 years ago
- ☆57Updated 2 years ago
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆29Updated 3 years ago
- ☆45Updated 4 years ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆17Updated 5 months ago
- ☆28Updated 2 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Updated 5 years ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆60Updated 2 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Updated 4 years ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆53Updated 10 months ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆35Updated 4 years ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆15Updated 2 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 4 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆43Updated last year