Ali Face attack competition
☆13Sep 12, 2019Updated 6 years ago
Alternatives and similar repositories for FaceAttack
Users that are interested in FaceAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Oct 1, 2019Updated 6 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆416Jul 6, 2021Updated 4 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Apr 1, 2024Updated 2 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆12Oct 27, 2020Updated 5 years ago
- Building Segmentation from Fused Satellite and Aerial Imagery Datasets using U-Net in FastAI☆15Jun 20, 2019Updated 6 years ago
- Testing different RL algorithms for multi-agent environments. From SARSA, QLearning to Independent Q-Learning, Joint Action Learning and …☆12Mar 29, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- tempeh is a framework to TEst Machine learning PErformance exHaustively which includes tracking memory usage and run time.☆18Jan 3, 2022Updated 4 years ago
- https://arxiv.org/abs/2102.12594☆14Oct 3, 2023Updated 2 years ago
- Metis: Understanding and Enhancing Regular Expressions in Network☆14Aug 19, 2022Updated 3 years ago
- 自建 WebShell 流量数据集☆18Mar 21, 2022Updated 4 years ago
- Code for https://arxiv.org/abs/1712.00254☆16Dec 6, 2017Updated 8 years ago
- An Orthogonal Classifier for Improving the Adversarial Robustness of Neural Networks☆14Oct 22, 2021Updated 4 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Cross-modal Coherence Modeling for Caption Generation☆11Jul 24, 2020Updated 5 years ago
- ICML'20: Intrinsic Reward Driven Imitation Learning via Generative Model☆15Nov 5, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- ☆14Oct 20, 2023Updated 2 years ago
- Real-time generic object detection on mobile platforms is a crucial but challenging computer vision task. However, previous CNN-based det…☆27May 18, 2019Updated 7 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- Towards High-Quality and Efficient Speech Bandwidth Extension with Parallel Amplitude and Phase Prediction☆13Jul 22, 2024Updated last year
- This repo contains the code for our AAAI-Workshop paper "Learning disentangled representations from 12-lead electrograms: application in …☆11Dec 12, 2018Updated 7 years ago
- Codes for paper "Stylized Story Generation with Style-Guided Planning"☆12May 9, 2021Updated 5 years ago
- TVRecap: A Dataset for Generating Stories with Character Descriptions☆21Jun 5, 2023Updated 2 years ago
- the source code of ACM MM'21 paper "Discriminator-free Generative Adversarial Attack"☆11Dec 3, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Network Attached Storage (NAS) Box using Raspberry Pi allows you to install comprehensive applications and services on your Raspberry Pi,…☆22Oct 28, 2017Updated 8 years ago
- ☆12Feb 15, 2021Updated 5 years ago
- ☆22May 7, 2024Updated 2 years ago
- ☆21Jul 16, 2020Updated 5 years ago
- Removes tiling artifacts created from stitching together adjacent tiles in large segmentation tasks.☆28May 6, 2025Updated last year
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆16Dec 8, 2022Updated 3 years ago
- Steps towards physical adversarial attacks on facial recognition☆83Oct 3, 2023Updated 2 years ago