zhang943 / Face-Adversarial-AttackView external linksLinks
An easy approach for the competition "Facial Adversary Examples" in TIANCHI
☆34Oct 1, 2019Updated 6 years ago
Alternatives and similar repositories for Face-Adversarial-Attack
Users that are interested in Face-Adversarial-Attack are comparing it to the libraries listed below
Sorting:
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆415Jul 6, 2021Updated 4 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- ☆43May 21, 2020Updated 5 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- ☆17Feb 25, 2019Updated 6 years ago
- 【AAAI 2022】Temporal Action Proposal Generation with Background Constraint☆17May 13, 2022Updated 3 years ago
- ☆18Sep 3, 2021Updated 4 years ago
- Steps towards physical adversarial attacks on facial recognition☆83Oct 3, 2023Updated 2 years ago
- ☆20Jun 21, 2022Updated 3 years ago
- A novel data-free model stealing method based on GAN☆133Oct 11, 2022Updated 3 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 2 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- An adversarial robustness evaluation library on face recognition.☆114Jul 6, 2023Updated 2 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆61May 14, 2019Updated 6 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆27Jan 6, 2022Updated 4 years ago
- [ICASSP 2024] The official repo for Harnessing the Power of Large Vision Language Models for Synthetic Image Detection☆34Aug 13, 2025Updated 6 months ago
- Code for the paper "Do text-free diffusion models learn discriminative visual representations?"☆33Dec 15, 2023Updated 2 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- The 1st solution for the DeepFake Game Competition (DFGC) @ IJCB 2021 Detection track.☆33Oct 13, 2022Updated 3 years ago
- Code for our Paper "SAMIHS: Adaptation of Segment Anything Model for Efficient Intracranial Hemorrhage Segmentation".☆35Feb 6, 2024Updated 2 years ago
- [ACM MM 2021] Diverse Image Inpainting with Bidirectional and Autoregressive Transformers☆33Oct 17, 2021Updated 4 years ago
- We Need No Pixels: Video Manipulation Detection Using Stream Descriptors☆10Oct 4, 2019Updated 6 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- Photorealism model use RealVisXL v4.0☆12Feb 20, 2024Updated last year
- CASME II: An Improved Spontaneous Micro-Expression Database and the Baseline Evaluation☆10Oct 19, 2018Updated 7 years ago
- BFloat16 Fused Adam Operator for PyTorch☆16Nov 16, 2024Updated last year
- A python script that can transfer ckpt file to pb file☆10Oct 24, 2020Updated 5 years ago
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- Graph Convolutional Module for Temporal Action Localization in Videos☆10Jul 4, 2020Updated 5 years ago
- The official implement of paper S2-VER: Semi-Supervised Visual Emotion Recognition☆11Apr 28, 2024Updated last year
- ☆10Oct 11, 2020Updated 5 years ago
- Python class to explore the ImageNet database☆16Jan 12, 2012Updated 14 years ago
- System that ranked 2nd in DCASE 2023 Challenge Task 5: Few-shot Bioacoustic Event Detection☆12Sep 5, 2024Updated last year
- Speech emotion recognition using LSTM, SVM and MLP | 语音情感识别☆10Jul 1, 2019Updated 6 years ago
- ☆12Nov 22, 2022Updated 3 years ago