pingerr / Face_adversarial_example
安全AI挑战者计划第一期-人脸识别对抗 7th 方案
☆23Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for Face_adversarial_example
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆67Updated 4 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆40Updated 7 months ago
- ☆42Updated 3 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆29Updated 5 years ago
- ☆10Updated last year
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Updated 4 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆32Updated 5 years ago
- white box adversarial attack☆37Updated 3 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆87Updated last year
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆25Updated 2 years ago
- ☆37Updated 4 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆90Updated 5 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆40Updated 4 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆74Updated 2 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60Updated 5 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆89Updated 2 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 6 years ago
- ☆12Updated 4 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆138Updated last year
- ☆41Updated 4 years ago
- ☆41Updated last year
- Code for Semantic Adversarial Attacks☆11Updated 3 years ago
- ☆26Updated 2 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆64Updated 5 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 3 years ago
- ☆67Updated 3 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆26Updated 2 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆69Updated 6 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Updated 5 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆129Updated 6 years ago