Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inference"
☆15Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for InvGAN
Users that are interested in InvGAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago
- Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models (published in ICLR2018)☆247Oct 24, 2019Updated 6 years ago
- ConvexPolytopePosioning☆37Jan 10, 2020Updated 6 years ago
- ☆15Jul 23, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Sep 29, 2020Updated 5 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- ☆12Oct 29, 2023Updated 2 years ago
- ☆26Jan 25, 2019Updated 7 years ago
- [ICASSP 2022] Official PyTorch Implementation for "Attention Probe: Vision Transformer Distillation in the Wild" (ICASSP 2022)☆11Jan 23, 2022Updated 4 years ago
- ☆15Mar 15, 2022Updated 4 years ago
- ☆10Mar 13, 2023Updated 3 years ago
- The list of some conference papers.☆11Apr 19, 2019Updated 7 years ago
- Official Code for DragGAN (SIGGRAPH 2023)☆18Jun 26, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of resources on generation.☆13Oct 9, 2022Updated 3 years ago
- The code of the ICLR 2024 paper: Adversarial Training on Purification (AToP): Advancing Both Robustness and Generalization☆10Nov 21, 2024Updated last year
- Music Demixing Challenge Submission Repo☆16Sep 8, 2023Updated 2 years ago
- ☆12Dec 22, 2025Updated 4 months ago
- Official TensorFlow-based implementation of adversarial attack for super-resolution models☆18Mar 22, 2021Updated 5 years ago
- Real-world video deblurring by synthesizing realistic blurs in RAW space☆13Jun 21, 2023Updated 2 years ago
- ☆15Jan 12, 2024Updated 2 years ago
- Proxy a single incomming TCP connection to multiple remote TCP servers☆13Apr 24, 2016Updated 10 years ago
- Diffusion-based korean text-to-image generation model☆12Aug 16, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Official implementation of the Odyssey paper "A Probabilistic Fusion Framework for Spoofing Aware Speaker Verification"☆18Jun 24, 2022Updated 3 years ago
- [CVPR 2021] Pytorch implementation for Probabilistic Modeling of Semantic Ambiguity for Scene Graph Generation☆19May 7, 2021Updated 4 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Oct 20, 2021Updated 4 years ago
- Emulates FCFS, RR, SJF, HPRN scheduling algorithms in an OS☆14Oct 24, 2017Updated 8 years ago
- Adversarially Robust Transfer Learning with LWF loss applied to the deep feature representation (penultimate) layer☆19Feb 9, 2020Updated 6 years ago
- Source code of "Hold me tight! Influence of discriminative features on deep network boundaries"☆21Dec 10, 2021Updated 4 years ago
- Multi-layer perceptron, Autoencoder, and Restricted Boltzmann Machine☆10Sep 15, 2018Updated 7 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆34Dec 16, 2019Updated 6 years ago
- A Tensorflow Implementation of the FastSpeech 2: Fast and High-Quality End-to-End Text to Speech☆11Aug 12, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Scripts, Files, and Resources for Constructing a Large-scale Dataset of Blackbox Effects for Timbre Transfer☆16Feb 4, 2023Updated 3 years ago
- ☆12Jul 6, 2023Updated 2 years ago
- A simple demonstration of how PyTorch autograd works☆16Sep 23, 2021Updated 4 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- A simple script automatically sign in v2ex☆12Apr 26, 2017Updated 9 years ago
- Editing in Style: Uncovering the Local Semantics of GANs☆15Jul 2, 2020Updated 5 years ago
- Code for "Adversarial Noise Layer: Regularize Neural Network By Adding Noise"☆16Mar 13, 2024Updated 2 years ago