MarcosRodrigoT / ViT-Face-RecognitionLinks
This is the official implementation of the paper titled "Comprehensive Comparison of Vision Transformers and Traditional Convolutional Neural Networks for Face Recognition Tasks"
☆12Updated 5 months ago
Alternatives and similar repositories for ViT-Face-Recognition
Users that are interested in ViT-Face-Recognition are comparing it to the libraries listed below
Sorting:
- ☆24Updated last year
- ☆23Updated 5 months ago
- ☆35Updated last year
- ☆26Updated 2 months ago
- HFMF: Hierarchical Fusion Meets Multi-Stream Models for Deepfake Detection☆11Updated 7 months ago
- Source Code for the JAIR Paper "Does CLIP Know my Face?" (Demo: https://huggingface.co/spaces/AIML-TUDA/does-clip-know-my-face)☆16Updated last year
- ☆11Updated 9 months ago
- ECCV2024: Adversarial Prompt Tuning for Vision-Language Models☆27Updated 8 months ago
- [CVPR2025] Any-Resolution AI-Generated Image Detection by Spectral Learning☆30Updated 2 weeks ago
- ☆12Updated 7 months ago
- ☆18Updated 2 years ago
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆16Updated last year
- Strong baselines for tampered text detection in pure vision domain☆23Updated 8 months ago
- ☆11Updated 6 months ago
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆15Updated 2 months ago
- ☆13Updated last month
- A Python framework for reliably assessing synthetic image detection methods☆46Updated 3 weeks ago
- We introduce AI-Face, the first million-scale AI-generated face dataset with demographic annotations, and conduct a comprehensive fairnes…☆55Updated 3 weeks ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆35Updated 3 months ago
- ☆20Updated 10 months ago
- [ECCV'24] Contrasting Deepfakes Diffusion via Contrastive Learning and Global-Local Similarities☆42Updated last month
- This is the official repository for the code and datasets in the paper "Progressive Open Space Expansion for Open-Set Model Attribution",…☆24Updated last year
- ☆12Updated last year
- [ICLR 2025] Image watermarks are removable using controllable regeneration from clean noise☆18Updated 5 months ago
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆23Updated 2 months ago
- this is for the ACM MM paper---Backdoor Attack on Crowd Counting☆18Updated 3 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆11Updated 10 months ago
- Robust Camera Trace Extraction (TIFS'23)☆11Updated last year
- ☆10Updated 3 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆21Updated last year