Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》
☆22May 13, 2022Updated 3 years ago
Alternatives and similar repositories for OPOM
Users that are interested in OPOM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆42Mar 11, 2022Updated 4 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆28Aug 17, 2023Updated 2 years ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Apr 22, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》☆30Nov 6, 2019Updated 6 years ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Code of TIP2021 Paper《SFace: Sigmoid-Constrained Hypersphere Loss for Robust Face Recognition》. We provide both MxNet and Pytorch version…☆103Jul 27, 2021Updated 4 years ago
- [ICLR 2025] MMFakeBench: A Mixed-Source Multimodal Misinformation Detection Benchmark for LVLMs☆43Mar 25, 2025Updated last year
- Unofficial PyTorch implementation of "L2M-GAN: Learning To Manipulate Latent Space Semantics for Facial Attribute Editing".☆21Aug 19, 2021Updated 4 years ago
- [CVPR 2023] Official repository of paper titled "CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent …☆102Mar 25, 2024Updated 2 years ago
- ☆15Jul 24, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Official implementation of the ECCV2024 paper: Generalizable Facial Expression Recognition☆20Sep 20, 2024Updated last year
- [ICML 2025] X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP☆42Feb 3, 2026Updated last month
- ☆12Apr 7, 2014Updated 11 years ago
- Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020)☆10Jan 5, 2022Updated 4 years ago
- [CVPR 2025🔥] Official codebase for "Global-Local Tree Search in VLMs for 3D Indoor Scene Generation"☆20Apr 18, 2025Updated 11 months ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- Official implementation of "Can You Spot the Chameleon? Adversarially Camouflaging Images from Co-Salient Object Detection" in CVPR 2022.☆19Mar 28, 2022Updated 4 years ago
- [ACM MM 2024] FKA-Owl: Advancing Multimodal Fake News Detection through Knowledge-Augmented LVLMs☆59Aug 8, 2024Updated last year
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆35Sep 6, 2025Updated 6 months ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆95Dec 1, 2022Updated 3 years ago
- ☆21Sep 23, 2025Updated 6 months ago
- Face Transformer for Recognition☆278Jan 3, 2022Updated 4 years ago
- [NeurIPS25 & ICML25 Workshop on Reliable and Responsible Foundation Models] A Simple Baseline Achieving Over 90% Success Rate Against the…☆90Feb 3, 2026Updated last month
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- ☆81Apr 26, 2024Updated last year
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆45Aug 12, 2023Updated 2 years ago
- RetinaFace ONNX Export and Inference☆12Jun 26, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Text-based real image editing with stable diffusion models☆27Dec 19, 2022Updated 3 years ago
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆46Jan 24, 2024Updated 2 years ago
- ☆25Mar 16, 2025Updated last year
- Code repository for the paper "Heuristic Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models"☆15Aug 7, 2025Updated 7 months ago
- The official implementation of AAAI 2023 "LeNo: Adversarial Robust Salient Object Detection Networks with Learnable Noise"☆16Apr 19, 2023Updated 2 years ago
- some baseline attack method by pytorch☆11Oct 13, 2021Updated 4 years ago
- The PyTorch implementation of our paper "Password-conditioned Anonymization and Deanonymization with Face Identity Transformers" in ECCV …☆35Mar 4, 2021Updated 5 years ago