stytim / LFW_Siamese_PytorchLinks
This project uses the Labeled Faces in the Wild (LFW) dataset, and the goal is to train variants of deep architectures to learn when a pair of images of faces is the same person or not. It is a pytorch implementation of Siamese network with 19 layers.
☆19Updated 7 years ago
Alternatives and similar repositories for LFW_Siamese_Pytorch
Users that are interested in LFW_Siamese_Pytorch are comparing it to the libraries listed below
Sorting:
- Pytorch reimplementation of "One pixel attack for fooling deep neural networks"☆87Updated 7 years ago
- A Simple pytorch implementation of GradCAM and GradCAM++☆396Updated 6 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆127Updated 8 years ago
- Triplet Loss Utility for Pytorch Library.☆13Updated last year
- Code for our CVPR 2018 paper, "On the Robustness of Semantic Segmentation Models to Adversarial Attacks"☆103Updated 6 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆167Updated 6 years ago
- Implementation for the paper (CVPR Oral): High Frequency Component Helps Explain the Generalization of Convolutional Neural Networks☆244Updated 4 years ago
- The re-implementation of Smooth Grad-CAM++ with pytorch☆66Updated 6 years ago
- A PyTorch implementation of Grad-CAM based on ICCV 2017 paper "Grad-CAM: Visual Explanations from Deep Networks via Gradient-based Local…☆62Updated 7 years ago
- Official implementation of Score-CAM in PyTorch☆433Updated 3 years ago
- Pytorch implementation of mainstream face recognition algorithms(ArcFace, CosFace).☆106Updated 5 years ago
- Tools for generating mini-ImageNet dataset and processing batches☆453Updated 5 years ago
- ☆71Updated 9 years ago
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆58Updated 6 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Updated 6 years ago
- Class Activation Mapping written in PyTorch.☆151Updated 3 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆142Updated 2 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Updated 7 years ago
- DSP-FWA: Dual Spatial Pyramid for Exposing Face Warp Artifacts in DeepFake Videos☆69Updated last year
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆64Updated 6 years ago
- Python script for downloading the FaceScrub face dataset.☆32Updated 7 years ago
- This is a simple demo to demonstrate how to perfrom GradCAM on the detectron2 models and it's API☆29Updated 4 years ago
- 2.56%, 15.20%, 1.30% on CIFAR10, CIFAR100, and SVHN https://arxiv.org/abs/1708.04552☆557Updated 5 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88Updated 6 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 7 years ago
- PyTorch library for adversarial attack and training☆145Updated 7 years ago
- The code for ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples (CVPR2019)☆115Updated 3 years ago
- ☆107Updated 4 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Updated 6 years ago
- A Universal Adversarial Dataset☆35Updated 5 years ago