onlinehuazai / EViTLinks
☆11Updated last year
Alternatives and similar repositories for EViT
Users that are interested in EViT are comparing it to the libraries listed below
Sorting:
- The papers of Deepfakes Detection.☆23Updated 4 years ago
- ☆41Updated 3 years ago
- Official repository of the paper Face Presentation Attack Detection by Eacavating Causal Clues and Adapting Embedding Statistics☆13Updated last year
- Official Repo of ICCV 2023Paper☆16Updated last year
- Deep Steganalysis training script☆10Updated last month
- Official Implementation of the ECCV 22 paper, "Teaching Where to Look: Attention Similarity Knowledge Distillation for Low Resolution Fac…☆59Updated 2 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆87Updated 2 years ago
- ☆41Updated 3 years ago
- Code for our research paper VStegNET☆13Updated 2 years ago
- Unified unsupervised and semi-supervised domain adaptation network for cross-scenario face anti-spoofing, Pattern Recognition☆14Updated 3 years ago
- ☆50Updated 5 years ago
- Code for CVPR 2023 paper "Rethinking Domain Generalization for Face Anti-spoofing: Separability and Alignment"☆92Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆74Updated 2 years ago
- This repository contains a CBIR system that uses swin transformer to extract image's feature.☆18Updated last year
- This is the official repository for the code and datasets in the paper "Deepfake Network Architecture Attribution", AAAI 2022.☆54Updated last year
- Code for CVPR 2022 https://arxiv.org/abs/2112.04016 DeepFace-EMD Re-ranking Using Patch-wise Earth Movers Distance Improves Out-Of-Distri…☆54Updated 2 years ago
- This is an official pytorch implementation of 'Effective Presentation Attack Detection Driven by Face Related Task'☆36Updated 2 years ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Updated 2 years ago
- ☆114Updated 3 years ago
- Unofficial PyTorch implementation of KeepAugment☆24Updated 3 years ago
- Code corresponding to the paper: "On the Robustness of Vision Transformers": https://arxiv.org/abs/2104.02610☆24Updated last year
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆17Updated 4 years ago
- The Pytorch Implemention of MesoNet☆70Updated 5 years ago
- Playground of Metric Learning with MNIST @pytorch. We provide ArcFace, CosFace, SphereFace, CircleLoss and visualization.☆24Updated 3 years ago
- the pytorch implementation of SubCenterArcface and sphereface2. And i add the prove of easy_margin part of Arcface in the codes.☆13Updated 3 years ago
- ☆18Updated 2 years ago
- ☆28Updated 2 years ago
- Pytorch implementation of F3Net (ECCV 2020 F3Net: Frequency in Face Forgery Network)☆164Updated 3 years ago
- This is a PyTorch Reimplementation of High-Capacity Convolutional Video Steganography with Temporal Residual Modeling (ICMR2019, oral)☆9Updated 3 years ago