安全AI挑战者计划第一期-人脸识别对抗 7th 方案
☆24Dec 7, 2023Updated 2 years ago
Alternatives and similar repositories for Face_adversarial_example
Users that are interested in Face_adversarial_example are comparing it to the libraries listed below
Sorting:
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Oct 1, 2019Updated 6 years ago
- ☆10May 14, 2023Updated 2 years ago
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- ☆41Mar 11, 2022Updated 3 years ago
- ☆43May 21, 2020Updated 5 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- An adversarial robustness evaluation library on face recognition.☆114Jul 6, 2023Updated 2 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 2 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 6 years ago
- iAETA(基于大数据与AI的地震临震预测) /todo☆13Jun 3, 2024Updated last year
- A python script that can transfer ckpt file to pb file☆10Oct 24, 2020Updated 5 years ago
- ☆10Jan 7, 2026Updated last month
- Implementation of "Designing Effective Inter-Pixel Information Flow for Natural Image Matting"☆11Mar 24, 2019Updated 6 years ago
- Credential providers demo set☆15Feb 5, 2026Updated 3 weeks ago
- SEED Labs学习笔记☆10Apr 10, 2018Updated 7 years ago
- EZW image codec according to Shapiro's paper, "Embedded Image Coding Using Zerotrees of Wavelet Coefficients."☆10Jan 14, 2018Updated 8 years ago
- ☆10Nov 21, 2020Updated 5 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 2 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆104Jul 8, 2021Updated 4 years ago
- Dive to Deep Learning with Pytorch C++ API☆10Jun 13, 2020Updated 5 years ago
- 一个用tikz绘制多维评价雷达图的自定义环境,以便于在LaTeX绘制多维评价雷达图。☆12Jan 5, 2019Updated 7 years ago
- Used TensorFlow to build a neural network that can predict fraudulent credit card transactions.☆10Jun 21, 2017Updated 8 years ago
- [NLPCC 2024] Shared Task 10: Regulating Large Language Models☆14Jun 12, 2024Updated last year
- A Go package that partially reimplements darts-clone☆12Apr 1, 2018Updated 7 years ago
- cisp考试资料☆13Aug 13, 2022Updated 3 years ago
- ☆12Apr 12, 2024Updated last year
- Imitation Adversarial Attacks for Black-box Neural Ranking Models☆12Feb 5, 2024Updated 2 years ago
- Detect paper corners in picture / video☆16Nov 25, 2019Updated 6 years ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Oct 29, 2020Updated 5 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆11Oct 27, 2020Updated 5 years ago
- FingerNet is an universal deep ConvNet for extracting fingerprint representations including orientation field, segmentation, enhenced fin…☆59May 30, 2023Updated 2 years ago
- Train GAN model ref NTU MLDS. 李宏毅老师的二次元人脸/头像数据集☆10Feb 19, 2026Updated last week
- Educational and demonstrative materials in experimentation, statistics, and computing for the Neuroscience Data Mining Group at the Helen…☆10Oct 13, 2016Updated 9 years ago
- FirmSec Dataset☆12Sep 1, 2021Updated 4 years ago