VDIGPKU / CMUA-WatermarkView external linksLinks
[AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes
☆108May 6, 2024Updated last year
Alternatives and similar repositories for CMUA-Watermark
Users that are interested in CMUA-Watermark are comparing it to the libraries listed below
Sorting:
- ☆47Nov 17, 2022Updated 3 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆38Jun 14, 2023Updated 2 years ago
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆65Mar 8, 2024Updated last year
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆18Oct 29, 2025Updated 3 months ago
- ☆26Nov 7, 2023Updated 2 years ago
- 🔥🔥Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networks☆344May 7, 2020Updated 5 years ago
- [ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation☆58Dec 12, 2022Updated 3 years ago
- ☆36Apr 7, 2022Updated 3 years ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆77Apr 16, 2023Updated 2 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Aug 30, 2020Updated 5 years ago
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Dec 6, 2023Updated 2 years ago
- Official pytorch implementation of WACV 2023 Paper "Proactive Deepfake Defence via Identity Watermarking" for both training and evaluatio…☆24Feb 21, 2023Updated 2 years ago
- Celeb-DF++: A Large-scale Challenging Video DeepFake Benchmark for Generalizable Forensics☆26Jul 29, 2025Updated 6 months ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- This repo is the official implementation of “Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection”. Accepted by A…☆78Mar 17, 2024Updated last year
- Unofficial Implementation: Learning Self-Consistency for Deepfake Detection☆58May 19, 2022Updated 3 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- Deepfakes detection☆60Apr 13, 2023Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- This repository is the official implementation of "DiffusionFake: Enhancing Generalization in Deepfake Detection via Guided Stable Diffus…☆56Oct 8, 2024Updated last year
- ☆12Nov 25, 2023Updated 2 years ago
- [CVPR 2022 Oral] Detecting Deepfakes with Self-Blended Images https://arxiv.org/abs/2204.08376☆254Jan 14, 2024Updated 2 years ago
- (ICME2021) RPATTACK: REFINED PATCH ATTACK ON GENERAL OBJECT DETECTORS☆46Feb 14, 2022Updated 4 years ago
- Official code for Self-supervised Learning of Adversarial Example: Towards Good Generalizations for Deepfake Detection (CVPR 2022 oral)☆140May 29, 2022Updated 3 years ago
- ☆33Jun 4, 2022Updated 3 years ago
- [CVPR 2023 (Highlight)] Self-Supervised Video Forensics by Audio-Visual Anomaly Detection☆108May 12, 2024Updated last year
- ☆105Jun 7, 2024Updated last year
- Implementation for the IJCAI2021 work "Beyond the Spectrum: Detecting Deepfakes via Re-synthesis"☆36Mar 31, 2022Updated 3 years ago
- ☆15Feb 26, 2023Updated 2 years ago
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Oct 12, 2024Updated last year
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆15Feb 12, 2025Updated last year
- ☆14Nov 24, 2023Updated 2 years ago
- Landmark Recurrent Network: An efficient and robust framework for Deepfakes detection☆102Jan 8, 2024Updated 2 years ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆60Jan 15, 2023Updated 3 years ago
- Pytorch implementation of F3Net (ECCV 2020 F3Net: Frequency in Face Forgery Network)☆173Mar 16, 2022Updated 3 years ago