We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 optimization tricks.
☆16Sep 14, 2021Updated 4 years ago
Alternatives and similar repositories for LaSGSA
Users that are interested in LaSGSA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆39Jun 14, 2023Updated 2 years ago
- [ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation☆59Dec 12, 2022Updated 3 years ago
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆110May 6, 2024Updated 2 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository provides code for the paper ---- On Universal Black-Box Domain Adaptation.☆10Sep 2, 2021Updated 4 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆79Jan 13, 2022Updated 4 years ago
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆22Oct 29, 2025Updated 6 months ago
- We Need No Pixels: Video Manipulation Detection Using Stream Descriptors☆10Oct 4, 2019Updated 6 years ago
- Jam of papers that interest or bore me and my friends :P☆24Jan 4, 2026Updated 4 months ago
- A simple tutorial on adversarial attacks against deep neural networks☆38Nov 10, 2025Updated 6 months ago
- LLM for solidity smart contract automated program repair☆18Mar 5, 2025Updated last year
- ☆22Dec 12, 2022Updated 3 years ago
- [CVPR 2021: Oral] In this work, we show that high frequency Fourier spectrum decay discrepancies are not inherent characteristics for exi…☆29Jun 12, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- ☆36Apr 7, 2022Updated 4 years ago
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆68Mar 8, 2024Updated 2 years ago
- ☆13Feb 7, 2023Updated 3 years ago
- Resources for face forgery detection☆10Jul 6, 2022Updated 3 years ago
- 大模型技术30讲(原版),中文批注,30 Essential Questions and Answers on Machine Learning and AI,百面大模型☆36Aug 22, 2025Updated 8 months ago
- ☆14Jun 16, 2022Updated 3 years ago
- 宝可梦3代GBA汉字字库补丁(增益优化版)☆14Jul 15, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆31Jun 22, 2021Updated 4 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- ☆14Apr 11, 2018Updated 8 years ago
- Code and data for PAN and PAN-phys.☆14Mar 20, 2023Updated 3 years ago
- 微信小程序写的日历☆11May 4, 2017Updated 9 years ago
- Demo code for the paper: One Thing to Fool them All: Generating Interpretable, Universal, and Physically-Realizable Adversarial Features☆12Nov 30, 2023Updated 2 years ago
- It is a way to embedding two secret images onto one carrier image. Uses frequency magnitude modulation.☆14May 22, 2025Updated 11 months ago
- ☆10Mar 24, 2022Updated 4 years ago
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆14Mar 14, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆16Aug 9, 2019Updated 6 years ago
- This GitHub provides different DeepFakes Detectors using facial regions and considering three different state-of-the-art fake detection s…☆17Jun 19, 2025Updated 10 months ago
- ☆33Jun 4, 2022Updated 3 years ago
- Pytorch code for mutil-channel time series dataset. You can use this project to train LSTM to classify such data.☆13Sep 19, 2020Updated 5 years ago
- 中山大学志愿者服务系统☆13Dec 1, 2017Updated 8 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- Multimodal Neurons in Artificial Neural Networks☆16Oct 18, 2021Updated 4 years ago