Ali Face attack competition
☆13Sep 12, 2019Updated 6 years ago
Alternatives and similar repositories for FaceAttack
Users that are interested in FaceAttack are comparing it to the libraries listed below
Sorting:
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Oct 1, 2019Updated 6 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆11Oct 27, 2020Updated 5 years ago
- tempeh is a framework to TEst Machine learning PErformance exHaustively which includes tracking memory usage and run time.☆18Jan 3, 2022Updated 4 years ago
- Metis: Understanding and Enhancing Regular Expressions in Network☆14Aug 19, 2022Updated 3 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Cross-modal Coherence Modeling for Caption Generation☆11Jul 24, 2020Updated 5 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- ☆14Oct 20, 2023Updated 2 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- This repo contains the code for our AAAI-Workshop paper "Learning disentangled representations from 12-lead electrograms: application in …☆11Dec 12, 2018Updated 7 years ago
- Towards High-Quality and Efficient Speech Bandwidth Extension with Parallel Amplitude and Phase Prediction☆13Jul 22, 2024Updated last year
- Codes for paper "Stylized Story Generation with Style-Guided Planning"☆12May 9, 2021Updated 4 years ago
- the source code of ACM MM'21 paper "Discriminator-free Generative Adversarial Attack"☆11Dec 3, 2023Updated 2 years ago
- Network Attached Storage (NAS) Box using Raspberry Pi allows you to install comprehensive applications and services on your Raspberry Pi,…☆22Oct 28, 2017Updated 8 years ago
- ☆12Feb 15, 2021Updated 5 years ago
- Removes tiling artifacts created from stitching together adjacent tiles in large segmentation tasks.☆28May 6, 2025Updated 10 months ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆16Dec 8, 2022Updated 3 years ago
- ☆20Aug 25, 2025Updated 6 months ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- (NeurIPS-2019 MicroNet Challenge - 3rd Winner) Open source code for "SIPA: A simple framework for efficient networks"☆19Dec 18, 2022Updated 3 years ago
- code for WaveCNet☆18Jun 21, 2021Updated 4 years ago
- Mel spectrum based on tacotron2 for melgan speech synthesis☆15Mar 24, 2023Updated 2 years ago
- bin2bin, a Time-Frequency Generative Adversarial based method for Audio Packet Loss Concealment☆16Dec 29, 2023Updated 2 years ago
- Using VAEs to do clustering for classification☆11Nov 5, 2017Updated 8 years ago
- The official code to reproduce results from the NACCL2019 paper: White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks☆12Jun 4, 2019Updated 6 years ago
- This is the unofficial implementation of MFNet, from paper''a Mask Free Neural Network for Monaural Speech Enhancement''☆13Dec 20, 2024Updated last year
- System that ranked 2nd in DCASE 2023 Challenge Task 5: Few-shot Bioacoustic Event Detection☆12Sep 5, 2024Updated last year
- Deep One-Class Classification using Intra-Class Splitting☆15Jun 25, 2019Updated 6 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Feb 15, 2022Updated 4 years ago
- 软件工程课众包跑腿项目☆23Oct 12, 2022Updated 3 years ago
- ☆22Feb 25, 2019Updated 7 years ago
- ICLR 2023 paper "Exploring and Exploiting Decision Boundary Dynamics for Adversarial Robustness" by Yuancheng Xu, Yanchao Sun, Micah Gold…☆25May 2, 2023Updated 2 years ago
- [ICCV 2015] Low-rank Tensor constrained Multiview Subspace Clustering☆13Oct 24, 2019Updated 6 years ago
- Official Code for NAACL 2022 paper: "Persona-Guided Planning for Controlling the Protagonist's Persona in Story Generation"☆16Sep 1, 2022Updated 3 years ago