安全AI挑战者计划第一期-人脸识别对抗 7th 方案
☆24Dec 7, 2023Updated 2 years ago
Alternatives and similar repositories for Face_adversarial_example
Users that are interested in Face_adversarial_example are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Oct 1, 2019Updated 6 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- EqualAIs was a project that began as a part of the 2018 Assembly program at the Berkman Klein Center at Harvard University and the MIT Me…☆18Feb 24, 2021Updated 5 years ago
- ☆10May 14, 2023Updated 3 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 3 years ago
- ☆43May 21, 2020Updated 6 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Apr 1, 2024Updated 2 years ago
- Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"☆11Nov 29, 2021Updated 4 years ago
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.☆137Feb 18, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Jan 25, 2022Updated 4 years ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22May 13, 2022Updated 4 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- ☆17Feb 25, 2019Updated 7 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- Imitation Adversarial Attacks for Black-box Neural Ranking Models☆13Feb 5, 2024Updated 2 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- With a goal to make confidential computing easier, SOFAEnclave is a software stack consisting of key technologies such as HW/SW enclave i…☆17Jul 7, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- AGSS-VOS: Attention Guided Single-Shot Video Object Segmentation☆20Sep 27, 2021Updated 4 years ago
- A python script that can transfer ckpt file to pb file☆10Oct 24, 2020Updated 5 years ago
- SSM+layui+Echarts 医药管理系统☆11Aug 26, 2024Updated last year
- The development of WeChat Python☆15Dec 9, 2020Updated 5 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆416Jul 6, 2021Updated 4 years ago
- Used TensorFlow to build a neural network that can predict fraudulent credit card transactions.☆10Jun 21, 2017Updated 8 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- XServer accepts student code submissions from the LMS and runs the code using (separate) courseware graders☆73Jan 18, 2021Updated 5 years ago
- A list of recent adversarial attack and defense papers (including those on large language models)☆44Mar 18, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CTF challenge and Writeup☆13Apr 11, 2019Updated 7 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 3 years ago
- Python语言实现左程云《程序员代码面试指南》第二版☆14May 5, 2021Updated 5 years ago
- Train GAN model ref NTU MLDS. 李宏毅老师的二次元人脸/头像数据集☆10Updated this week
- Evaluation; object detection; AP; precision; Recall; MAP; ROC☆13Jul 5, 2019Updated 6 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆119Jun 3, 2019Updated 6 years ago