[IJCV 2024] Towards Unified Defense for Face Forgery and Spoofing Attacks via Dual Space Reconstruction Learning
☆20Nov 4, 2025Updated 4 months ago
Alternatives and similar repositories for UniDefense
Users that are interested in UniDefense are comparing it to the libraries listed below
Sorting:
- [ECCV 2024🔥] The official code for the paper DiffFAS: Face Anti-Spoofing via Generative Diffusion Models.☆42Sep 23, 2024Updated last year
- Official implementation of CVPR24 paper "Gradient Alignment for Cross-Domain Face Anti-Spoofing"☆79Apr 18, 2025Updated 10 months ago
- Official repository of the paper Face Presentation Attack Detection by Eacavating Causal Clues and Adapting Embedding Statistics☆14Aug 29, 2023Updated 2 years ago
- SynthASpoof: Developing Face Presentation Attack Detection Based on Privacy-friendly Synthetic Data☆52Apr 11, 2023Updated 2 years ago
- ☆17May 25, 2025Updated 9 months ago
- Official implementation of the paper "FLIP: Cross-domain Face Anti-spoofing with Language Guidance". (ICCV 2023)☆86Mar 26, 2024Updated last year
- Official repository of "KDFAS: Multi-Stage Knowledge Distillation Vision Transformer for Face Anti-Spoofing".☆10Oct 9, 2024Updated last year
- [ICLR 2026] SpatialLadder: Progressive Training for Spatial Reasoning in Vision-Language Models☆74Jan 29, 2026Updated last month
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)☆18Mar 31, 2025Updated 11 months ago
- Face Depth map Generation using PRNet☆10Dec 21, 2020Updated 5 years ago
- ☆14Dec 18, 2024Updated last year
- Domain Adaptation with Adversarial Training on Penultimate Activations (AAAI 2023)☆11Aug 1, 2023Updated 2 years ago
- Code for CVPR 2023 paper "Rethinking Domain Generalization for Face Anti-spoofing: Separability and Alignment"☆98Apr 12, 2023Updated 2 years ago
- ☆10Oct 25, 2019Updated 6 years ago
- AIRS-Bench: an AI Research Science benchmark for quantifying the end-to-end AI research abilities of LLM agents☆62Feb 27, 2026Updated last week
- Card Verifiable Certificates (CVC) tools for Python☆18Feb 11, 2026Updated 3 weeks ago
- Unsupervised Tracklet Person Re-Identification☆10Apr 29, 2019Updated 6 years ago
- The code and datasets of our ACM MM 2024 paper "Hallu-PI: Evaluating Hallucination in Multi-modal Large Language Models within Perturbed …☆11Sep 27, 2024Updated last year
- Official repository for Polarity Sampling, CVPR 2022 ORAL☆13Jul 25, 2022Updated 3 years ago
- ☆12Nov 25, 2023Updated 2 years ago
- ☆17Mar 14, 2024Updated last year
- Diffusion-generated Facial Forgery Dataset☆54Mar 4, 2024Updated 2 years ago
- ☆12Sep 7, 2022Updated 3 years ago
- 中山大学毕业论文/设计 LaTeX 模板(本科/研究生)☆33Updated this week
- Benchmarking Joint Face Spoofing and Forgery Detection with Visual and Physiological Cues (TDSC'24)☆14Jan 14, 2024Updated 2 years ago
- Official PyTorch implementation of our paper "Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World A…☆11Feb 8, 2023Updated 3 years ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆55Oct 14, 2024Updated last year
- ☆12Dec 12, 2021Updated 4 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- Notes for references from internet websites.☆13Dec 23, 2014Updated 11 years ago
- Official implement of ISTVT: Interpretable Spatial-Temporal Video Transformer for Deepfake Detection.☆14Jan 18, 2024Updated 2 years ago
- ☆16Dec 18, 2023Updated 2 years ago
- This repo implements VGG's Comparator Network [1].☆11Sep 4, 2018Updated 7 years ago
- [ACM MM 2025] DFBench: Benchmarking Deepfake Image Detection Capability of Large Multimodal Models☆24Aug 6, 2025Updated 7 months ago
- ☆16Aug 3, 2021Updated 4 years ago
- A 3rd-party implemented Face-Xray for deepfake detection.☆13Jun 2, 2020Updated 5 years ago
- Instruction tuning dataset generation inspired by LLaVA-Instruct-158k via any LLM, also for commercial use.☆13Mar 13, 2024Updated last year
- Official Pytorch implementation for our ACM MM 2023 paper: Moiré Backdoor Attack (MBA): A Novel Trigger for Pedestrian Detectors in the P…☆16Jan 22, 2024Updated 2 years ago