Official implementation of the paper "GANprintR: Improved Fakes and Evaluation of the State-of-the-Art in Face Manipulation Detection"
☆25Apr 17, 2020Updated 6 years ago
Alternatives and similar repositories for gan_fingerprint_removal
Users that are interested in gan_fingerprint_removal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Author implementation of Exploring Adversarial Fake Images on Face Manifold (CVPR 2021 oral)☆32Mar 2, 2023Updated 3 years ago
- Dataset of synthetic faces modified by a GAN-fingerprint removal approach☆17Jun 19, 2020Updated 5 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆126Apr 16, 2023Updated 3 years ago
- ☆47Nov 17, 2022Updated 3 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is the official repository for the ECCV 2022 paper "RepMix: Representation Mixing for Robust Attribution of Synthesized Images"☆21Jul 22, 2022Updated 3 years ago
- Weakly supervised deepfake localization☆30Aug 4, 2025Updated 9 months ago
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated 2 years ago
- ☆104Jul 2, 2020Updated 5 years ago
- ☆50Apr 28, 2020Updated 6 years ago
- ☆21May 4, 2022Updated 4 years ago
- mobileNet SSD 基于caffe的前向检测☆10Nov 30, 2018Updated 7 years ago
- ☆31Dec 8, 2022Updated 3 years ago
- ☆57Jan 14, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 8 years ago
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- Code for the paper: Learning on Gradients: Generalized Artifacts Representation for GAN-Generated Images Detection☆114Aug 17, 2023Updated 2 years ago
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆46Jan 24, 2024Updated 2 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- Code for the ICML 2020 paper: Leveraging Frequency Analysis for Deep Fake Image Recognition.☆197Feb 15, 2023Updated 3 years ago
- Official code for Self-supervised Learning of Adversarial Example: Towards Good Generalizations for Deepfake Detection (CVPR 2022 oral)☆142May 29, 2022Updated 3 years ago
- ☆19Jul 5, 2020Updated 5 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆12Jun 26, 2020Updated 5 years ago
- NeurIPS 2020 paper: UnModNet: Learning to Unwrap a Modulo Image for High Dynamic Range Imaging☆10Oct 24, 2021Updated 4 years ago
- 基于PC-DDSP和nsf-HiFiGAN的声码器☆18Jul 17, 2023Updated 2 years ago
- ☆60Jun 17, 2023Updated 2 years ago
- [ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation☆59Dec 12, 2022Updated 3 years ago
- Implementation for paper "Disentangled Speech Representation Learning for One-Shot Cross-Lingual Voice Conversion Using ß-VAE"☆44Apr 10, 2023Updated 3 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- ☆10Nov 22, 2022Updated 3 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Jul 18, 2023Updated 2 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆32Oct 15, 2024Updated last year
- ☆11Apr 7, 2026Updated last month
- [ECCVW 2024 -- ORAL] Official repository of paper titled "Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors".☆12Oct 11, 2024Updated last year
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Apr 16, 2023Updated 3 years ago
- Learning a Deep Dual-level Network for Robust DeepFake Detection☆33Jun 13, 2022Updated 3 years ago