Megum1 / CO-SPYLinks
[CVPR'25] CO-SPY: Combining Semantic and Pixel Features to Detect Synthetic Images by AI
☆32Updated this week
Alternatives and similar repositories for CO-SPY
Users that are interested in CO-SPY are comparing it to the libraries listed below
Sorting:
- We propose a statistical consistency attack (StatAttack) against diverse DeepFake detectors.☆18Updated 2 years ago
- ☆32Updated last year
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆20Updated last year
- ☆30Updated 6 months ago
- Implementation of paper "Leveraging Representations from Intermediate Encoder-blocks for Synthetic Image Detection"☆43Updated last year
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆57Updated last year
- ☆19Updated 5 months ago
- The official code of "DRCT: Diffusion Reconstruction Contrastive Training towards Universe Detection of Diffusion Generated Images"☆159Updated 8 months ago
- A list of awesome papers on AI-generated Image Detection.☆82Updated last month
- [CVPR 2024] official code for SimAC☆22Updated 11 months ago
- This is the official implementation of AntifakePrompt.☆43Updated last year
- This repository is the official implementation of "DiffusionFake: Enhancing Generalization in Deepfake Detection via Guided Stable Diffus…☆57Updated last year
- ☆36Updated 2 years ago
- Synthetic Images Analysis☆47Updated 2 years ago
- A collection of important papers on Generalizable Diffusion-generated Image Detection☆16Updated 9 months ago
- New AIGC detection benchmark, including six benchmarks.☆46Updated last week
- The released data for the paper entilted "FakeBench: Probing Explainable Fake Image Detection via Large Multimodal Models"☆50Updated 5 months ago
- ☆46Updated 8 months ago
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Updated last year
- Dataset for GAN-Generated Images Detection☆10Updated last year
- ☆34Updated this week
- ☆33Updated last month
- C2P-CLIP-DeepfakeDetection☆80Updated last week
- [ECCV 2024] Robust-Wide: Robust Watermarking against Instruction-driven Image Editing (Official Implementation)☆33Updated 6 months ago
- ☆39Updated 6 months ago
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)☆18Updated 8 months ago
- ☆32Updated 3 years ago
- ☆12Updated 2 years ago
- Official code for Forensics Adapter (CVPR'25).☆74Updated 2 months ago
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Updated last year