Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)
☆18Apr 15, 2024Updated 2 years ago
Alternatives and similar repositories for PFF
Users that are interested in PFF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Jul 18, 2023Updated 2 years ago
- [ECCVW 2024 -- ORAL] Official repository of paper titled "Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors".☆12Oct 11, 2024Updated last year
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification☆16Oct 31, 2023Updated 2 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆13Sep 6, 2023Updated 2 years ago
- ☆15Apr 7, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"☆15Oct 29, 2025Updated 6 months ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆21Aug 10, 2024Updated last year
- ☆15Nov 24, 2023Updated 2 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- Official PyTorch implementation for the paper Generalizable Face Landmarking Guided by Conditional Face Warping (CVPR 2024).☆31Nov 21, 2024Updated last year
- [CVPR2022] End-to-End Reconstruction-Classification Learning for Face Forgery Detection☆155Jun 8, 2022Updated 3 years ago
- This is the official implementation of the paper titled "Comprehensive Comparison of Vision Transformers and Traditional Convolutional Ne…☆14Mar 4, 2025Updated last year
- ☆12Mar 5, 2024Updated 2 years ago
- ECCV2024: Adversarial Prompt Tuning for Vision-Language Models☆31Mar 7, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆18Jan 17, 2025Updated last year
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- ☆24Feb 13, 2024Updated 2 years ago
- Code for AAAI 2021 paper "Domain General Face Forgery Detection by Learning to Weight" (AAAI 2021).☆61Dec 11, 2020Updated 5 years ago
- Official implementation of the paper "GANprintR: Improved Fakes and Evaluation of the State-of-the-Art in Face Manipulation Detection"☆25Apr 17, 2020Updated 6 years ago
- ☆13Jul 21, 2025Updated 9 months ago
- Code for Video Deepfake Detector from "MINTIME: Multi-Identity Size-Invariant Video Deepfake Detection", paper available on IEEE Transact…☆69Jun 5, 2024Updated last year
- ☆28Feb 1, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆111Jun 7, 2024Updated last year
- This is an official implementation in PyTorch of PTH-Net: Dynamic Facial Expression Recognition without Face Detection and Alignment..☆13Jul 1, 2025Updated 10 months ago
- ☆30Apr 27, 2026Updated last week
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- [AAAI 2024] VSFormer: Visual-Spatial Fusion Transformer for Correspondence Pruning☆16Apr 7, 2024Updated 2 years ago
- [CVPR 2023 Highlight] Official implementation of the paper: "AltFreezing for More General Video Face Forgery Detection"☆95Sep 25, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- ☆14Jan 20, 2025Updated last year
- 社会新闻检索系统,信息检索导论☆13Nov 19, 2019Updated 6 years ago
- CORE: COnsistent REpresentation Learning for Face Forgery Detection, CVPRW 22☆53Apr 6, 2023Updated 3 years ago
- ☆31Jan 20, 2024Updated 2 years ago
- ☆11Mar 22, 2021Updated 5 years ago
- Official code for Forensics Adapter (CVPR'25).☆98Mar 1, 2026Updated 2 months ago