AISG-Technology-Team / Trusted-Media-Challenge-Submission-Guide
AISG Trusted Media Challenge Submission Guide: This repository serves as a step by step guide to help participants with creating a valid submission for the Trusted Media Challenge.
☆17Updated 3 years ago
Alternatives and similar repositories for Trusted-Media-Challenge-Submission-Guide:
Users that are interested in Trusted-Media-Challenge-Submission-Guide are comparing it to the libraries listed below
- The papers of Deepfakes Detection.☆23Updated 4 years ago
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆72Updated 2 years ago
- Implementation for the IJCAI2021 work "Beyond the Spectrum: Detecting Deepfakes via Re-synthesis"☆37Updated 3 years ago
- ☆14Updated last year
- The 1st solution for the DeepFake Game Competition (DFGC) @ IJCB 2021 Detection track.☆35Updated 2 years ago
- DF-W: a new deepfake dataset comprising of deepfake videos created and shared by the Internet community☆18Updated last year
- This is the official implementation of AntifakePrompt.☆33Updated 8 months ago
- ☆40Updated last year
- This is the official repository for the code and datasets in the paper "Deepfake Network Architecture Attribution", AAAI 2022.☆54Updated last year
- [NeurIPS 2021] “When does Contrastive Learning Preserve Adversarial Robustness from Pretraining to Finetuning?”☆48Updated 3 years ago
- Official implementation of "Removing Batch Normalization Boosts Adversarial Training" (ICML'22)☆19Updated 2 years ago
- Smooth Adversarial Training☆67Updated 4 years ago
- ☆84Updated 3 months ago
- Code for "Transfer Learning without Knowing: Reprogramming Black-box Machine Learning Models with Scarce Data and Limited Resources". (IC…☆38Updated 4 years ago
- A Universal Adversarial Dataset☆33Updated 4 years ago
- OpenForensics Dataset☆24Updated 2 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆61Updated 2 years ago
- Official implementation of "When Adversarial Training Meets Vision Transformers: Recipes from Training to Architecture" published at Neur…☆33Updated 7 months ago
- ☆11Updated 3 years ago
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Updated last year
- ☆58Updated 2 years ago
- The solution for the DeeperForensics Challenge 2020☆28Updated 3 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30Updated 2 years ago
- [NeurIPS'21] "AugMax: Adversarial Composition of Random Augmentations for Robust Training" by Haotao Wang, Chaowei Xiao, Jean Kossaifi, Z…☆125Updated 3 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Updated 3 years ago
- ☆33Updated 2 years ago
- Solution to Deepfake Detection Challenge☆26Updated 2 years ago
- ☆30Updated 3 years ago
- Helper-based Adversarial Training: Reducing Excessive Margin to Achieve a Better Accuracy vs. Robustness Trade-off☆30Updated 3 years ago
- Media Forensics / Fake Detection experiments in PyTorch. Implements Fighting Fake News: Image Splice Detection via Learned Self-Consisten…☆25Updated 3 years ago