wi-pi / face-off
☆10Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for face-off
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆59Updated 5 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆31Updated last year
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆63Updated 4 years ago
- A fast sparse attack on deep neural networks.☆50Updated 4 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆24Updated 2 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 4 years ago
- Scripts to prepare OXFORD VGG Face dataset☆12Updated 8 years ago
- Data independent universal adversarial perturbations☆60Updated 4 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆36Updated 2 years ago
- ConvexPolytopePosioning☆34Updated 4 years ago
- This code reproduces the results of the paper, "Measuring Data Leakage in Machine-Learning Models with Fisher Information"☆49Updated 3 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 6 years ago
- Code for generating adversarial color-shifted images☆19Updated 5 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆42Updated last year
- InstaHide: Instance-hiding Schemes for Private Distributed Learning☆50Updated 4 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆17Updated 3 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆44Updated 4 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆31Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆29Updated 3 years ago
- [NeurIPS 2019] This is the code repo of our novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into va…☆79Updated last year
- PyTorch implementation of Adversarial Patch☆13Updated last year
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 4 years ago
- Generalized Data-free Universal Adversarial Perturbations☆69Updated 6 years ago
- ☆27Updated 2 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 4 years ago
- ☆60Updated 9 months ago
- Knowledge distillation (KD) from a decision-based black-box (DB3) teacher without training data.☆20Updated 2 years ago
- ☆17Updated 4 years ago
- A tensorflow implementation and improvement of CVPR 2019 paper 'ComDefend'.☆15Updated 4 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆40Updated 4 years ago