ndb796 / CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch
CelebA HQ Face Identity and Attributes Recognition using PyTorch
☆34Updated last year
Alternatives and similar repositories for CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch:
Users that are interested in CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch are comparing it to the libraries listed below
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆30Updated 3 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆24Updated 4 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆29Updated last year
- Official repo for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization☆13Updated last year
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆22Updated last year
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆17Updated last year
- ☆25Updated 8 months ago
- Certified robustness "for free" using off-the-shelf diffusion models and classifiers☆40Updated last year
- ☆59Updated 2 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆28Updated 4 years ago
- ☆19Updated last year
- Universal Adversarial Perturbations (UAPs) for PyTorch☆48Updated 3 years ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆55Updated last year
- SEAT☆20Updated last year
- Consistency Regularization for Adversarial Robustness (AAAI 2022)☆53Updated 3 years ago
- ☆42Updated last year
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆87Updated 7 months ago
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆34Updated 7 months ago
- ☆29Updated 3 years ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆22Updated 4 months ago
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆35Updated 4 years ago
- ☆61Updated 3 years ago
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆135Updated last year
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 5 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆73Updated 2 years ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆101Updated last year
- Data-Efficient Backdoor Attacks☆18Updated 2 years ago
- [NeurIPS 2021] “When does Contrastive Learning Preserve Adversarial Robustness from Pretraining to Finetuning?”☆48Updated 3 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆60Updated 3 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆29Updated 2 years ago