Official PyTorch Implementation for G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors (TIFS-2024)
☆17Aug 27, 2024Updated last year
Alternatives and similar repositories for G2Face
Users that are interested in G2Face are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- (2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition☆10Apr 3, 2026Updated last month
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- Author implementation of RiDDLE: Reversible and Diversified De-identification with Latent Encryptor (CVPR 2023)☆52Jul 3, 2025Updated 10 months ago
- Official implementation for "An image is worth multiple words: discovering object level concepts using multi-concepts prompts learning" […☆17Jul 16, 2024Updated last year
- [CVPR 2023, top-10%] Authors official PyTorch implementation of the "Attribute-preserving Face Dataset Anonymization via Latent Code Opti…☆77Aug 8, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 空域明文可逆信息隐藏☆11Jul 6, 2020Updated 5 years ago
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago
- Repository for Federated Learning with Differential Privacy☆11May 28, 2022Updated 3 years ago
- [ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos☆12Mar 29, 2024Updated 2 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- ☆32Dec 30, 2025Updated 4 months ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆61Aug 17, 2024Updated last year
- An implementation of ACGAN with adversarial loss and training algorithm from Improved WGAN.☆10Jan 2, 2019Updated 7 years ago
- ☆15Mar 20, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The official Pytorch implementation of paper Where is My Spot? Few-shot Image Generation via Latent Subspace Optimization, CVPR 2023.☆11Jan 6, 2024Updated 2 years ago
- [NeurIPS2024] Official Codes of the Paper "Gradient Guidance for Diffusion Models: An Optimization Perspective"☆25Mar 21, 2025Updated last year
- MM-Diff: High-Fidelity Image Personalization via Multi-Modal Condition Integration☆28May 30, 2024Updated last year
- [CVPR 2024] Face2Diffusion for Fast and Editable Face Personalization https://arxiv.org/abs/2403.05094☆98Mar 28, 2024Updated 2 years ago
- This repository provides code for the paper ---- On Universal Black-Box Domain Adaptation.☆10Sep 2, 2021Updated 4 years ago
- [ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation☆59Dec 12, 2022Updated 3 years ago
- [MICCAI 2025] Hierarchical Self-Supervised Adversarial Training for Robust Vision Models in Histopathology☆12Jun 17, 2025Updated 11 months ago
- (CVPR 2024) Uniformity and Variance for Heterogeneous Federated Learning☆12Mar 6, 2024Updated 2 years ago
- The official code of "DRCT: Diffusion Reconstruction Contrastive Training towards Universe Detection of Diffusion Generated Images"☆168Apr 5, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Official repository of "A Hitchhiker's Guide to Fine-Grained Face Forgery Detection Using Common Sense Reasoning" published in NeurIPS'20…☆12Feb 7, 2025Updated last year
- The official implantation of SGPT (CVPR2024)☆18Jul 15, 2024Updated last year
- [CVPR 2025] An Implementation of the paper "Pre-Instruction Data Selection for Visual Instruction Tuning"☆17Jun 9, 2025Updated 11 months ago
- Official implementation of HairGS, a novel framework for reconstructing detailed hair strands from multi-view images using 3D Gaussian Sp…☆28Apr 1, 2026Updated last month
- codes for FreeUV: Ground-Truth-Free Realistic Facial UV Texture Recovery via Cross-Assembly Inference Strategy (CVPR2025)☆20Jun 18, 2025Updated 11 months ago
- ☆16May 24, 2024Updated last year
- Unofficial PyTorch Implementation for paper FlashFace☆15Apr 9, 2024Updated 2 years ago
- Privacy-preserving multi-pose face recognition system☆32May 23, 2025Updated 11 months ago
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Jul 18, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [ECCVW 2024 -- ORAL] Official repository of paper titled "Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors".☆12Oct 11, 2024Updated last year
- ☆12Mar 5, 2024Updated 2 years ago
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆18Jan 17, 2025Updated last year
- Abstract. Person search is a challenging problem with various real- world applications, that aims at joint person detection and re-identi…☆13Feb 28, 2024Updated 2 years ago
- ☆30Aug 2, 2024Updated last year
- ☆15Oct 3, 2023Updated 2 years ago
- OxML2020☆12Aug 14, 2020Updated 5 years ago