-
Notifications
You must be signed in to change notification settings - Fork 3
/
LICENSE
30 lines (24 loc) · 2.27 KB
/
LICENSE
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Copyright (c) 2020 Arizona Board of Regents. All Rights Reserved.
Code developed by: Tejas Borkar (tsborkar@asu.edu)
Contact: Tejas Borkar (tsborkar@asu.edu) and Lina Karam (karam@asu.edu)
Image, Video, and Usabilty (IVU) Lab, http://ivulab.asu.edu , Arizona State University
This copyright statement may not be removed from any file containing it or from modifications to these files.
This copyright notice must also be included in any file or product that is derived from the source files.
Redistribution and use of this code in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
– Redistribution’s of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
– Redistribution’s in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer
in the documentation and/or other materials provided with the distribution.
– The Image, Video, and Usability Laboratory (IVU Lab, http://ivulab.asu.edu) is acknowledged in any publication that reports
research results using this code, copies of this code, or modifications of this code.
The code and our papers are to be cited in the bibliography as:
T. Borkar, F. Heide and L. Karam, ”Defending Against Universal Attacks Through Selective Feature Regeneration,” IEEE/CVF
Conference on Computer Vision and Pattern Recognition (CVPR), 2020, pp. 709-719.
DISCLAIMER:
This software is provided by the copyright holders and contributors “as is” and any express or implied warranties, including, but
not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall
the Arizona Board of Regents, Arizona State University, IVU Lab members, authors or contributors be liable for any direct, indirect,
incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of substitute goods or services;
loss of use, data, or profits; or business interruption) however caused and on any theory of liability, whether in contract, strict
liability, or tort (including negligence or otherwise) arising in any way out of the use of this software, even if advised of the
possibility of such damage.