Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
☆18Aug 23, 2024Updated last year
Alternatives and similar repositories for SRAE
Users that are interested in SRAE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official pytorch implementation of WACV 2023 Paper "Proactive Deepfake Defence via Identity Watermarking" for both training and evaluatio…☆24Feb 21, 2023Updated 3 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆39Jun 14, 2023Updated 2 years ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Aug 3, 2022Updated 3 years ago
- Author implementation of Exploring Adversarial Fake Images on Face Manifold (CVPR 2021 oral)☆32Mar 2, 2023Updated 3 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆19Mar 24, 2023Updated 3 years ago
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆52Nov 16, 2022Updated 3 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆73Apr 5, 2018Updated 8 years ago
- Image Encryption and Decryption using Neural Networks☆16Oct 14, 2019Updated 6 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Nov 28, 2023Updated 2 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 9 months ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆64Jul 7, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The source code of our WACV2020 paper "Self-Contained Stylization via Steganographyfor Reverse and Serial Style Transfer".☆11Jun 8, 2023Updated 2 years ago
- ☆14Mar 12, 2023Updated 3 years ago
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- 2022年华为软件精英赛初赛☆11Apr 2, 2022Updated 4 years ago
- A repository to caculate the just noticable difference of an image by Python☆29Mar 25, 2021Updated 5 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Apr 16, 2023Updated 3 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆65Mar 8, 2024Updated 2 years ago
- An unofficial implementation of the paper《Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective》☆22Nov 24, 2022Updated 3 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- Adversarial Augmentation Against Adversarial Attacks☆32May 23, 2023Updated 2 years ago
- Old implementation and demonstration of the Capsule-Forensics. The Capsule-Forensics-v2 has been released here: https://github.com/nii-ya…☆37Oct 30, 2019Updated 6 years ago
- Light Field Messaging with Deep Photographic Steganography☆44Nov 10, 2020Updated 5 years ago
- 使用servlet,jsp,java及ajax完成的一个博客项目☆16Mar 8, 2020Updated 6 years ago
- ☆36Apr 7, 2022Updated 4 years ago
- ☆35May 29, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Unofficial PyTorch implementation of the paper "Feature Importance-aware Transferable Adversarial Attacks"☆11Oct 28, 2025Updated 5 months ago
- A pytorch implementation of Structural Design of Convolutional Neural Networks for Steganalysis (Xunet)☆39Jan 2, 2026Updated 3 months ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆22Oct 29, 2025Updated 5 months ago
- List of diffusion papers accepted in ECCV 2024.☆15Oct 17, 2024Updated last year
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- Phase-aware Adversarial Defense for Improving Adversarial Robustness☆11Oct 12, 2023Updated 2 years ago