IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)
☆10Sep 10, 2019Updated 6 years ago
Alternatives and similar repositories for prnu-anonymization-detector
Users that are interested in prnu-anonymization-detector are comparing it to the libraries listed below
Sorting:
- Python implementation of PRNU extractor☆82Feb 2, 2023Updated 3 years ago
- Official repository for the paper "On the use of Benford's law to detect GAN-generated images", ICPR2020☆13Apr 7, 2021Updated 4 years ago
- Copy–Move forgery or Cloning is a type of Image tampering where a part of the image is copied and pasted on another part of same image…☆18Oct 23, 2021Updated 4 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆59Dec 3, 2019Updated 6 years ago
- CNN-based fast source device identification☆24Sep 5, 2022Updated 3 years ago
- Arduino repository☆14Aug 24, 2022Updated 3 years ago
- ☆12Dec 22, 2025Updated 2 months ago
- Implementation of the ICIP paper "GPU-ACCELERATED SIFT-AIDED SOURCE IDENTIFICATION OF STABILIZED VIDEOS"☆11Oct 6, 2023Updated 2 years ago
- Tool for testing IPv4 and IPv6 DHCP services☆13Mar 27, 2020Updated 5 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- A recurrent neural network model to analyze how travelers expressed their feelings on Twitter☆12Jun 30, 2019Updated 6 years ago
- MATLAB tools to read TerraSAR-X / TanDEM-X datasets☆12Dec 9, 2013Updated 12 years ago
- This is the code of our work CISS Certified Robustness Against Natural Language Attacks by Causal Intervention published on ICML 2022☆11Dec 6, 2022Updated 3 years ago
- 1-step Q Learning from the paper "Asynchronous Methods for Deep Reinforcement Learning"☆12Mar 13, 2017Updated 8 years ago
- Android的一些主流组件,小框架,工具类,技巧等☆13Jul 4, 2016Updated 9 years ago
- ParIDE — World's first IDE for Werewolf moderators.☆10Dec 6, 2016Updated 9 years ago
- Implementation of joint bayesian model, written in python.☆11Aug 2, 2021Updated 4 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- ☆10Jul 25, 2018Updated 7 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- ☆11Mar 13, 2023Updated 2 years ago
- Heterogeneous Model Reuse via Optimizing Multiparty Multiclass Margin☆11Jan 15, 2020Updated 6 years ago
- ☆13Apr 26, 2022Updated 3 years ago
- ☆10Jan 17, 2019Updated 7 years ago
- ☆12Apr 22, 2024Updated last year
- Developer focused AI Gateway☆15Mar 7, 2025Updated last year
- GAN-generated image detection based on CNNs☆47Sep 5, 2023Updated 2 years ago
- 🚀 Building an OpenAI-Compatible API with Open-Source LLM: Rate-Limiting, Custom API Keys 🔐, and Streamlit Authentication 🌐☆23Sep 9, 2024Updated last year
- PHP WebSocket Server for PHP 5.3☆28Jul 29, 2012Updated 13 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- Proxy a single incomming TCP connection to multiple remote TCP servers☆13Apr 24, 2016Updated 9 years ago
- Implementation of SegNet in Keras☆12Mar 14, 2021Updated 4 years ago
- A python program to use a marlin 3d printer as a 3 axis CMM☆11Nov 21, 2022Updated 3 years ago
- Robust Camera Trace Extraction (TIFS'23)☆12Oct 3, 2023Updated 2 years ago
- Hand Gesture Recognition-opencv☆12Jul 10, 2016Updated 9 years ago
- Finding Gender/Age of Authors based on written text☆13Apr 21, 2019Updated 6 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- 农作物病害检测 2018 ai challenger☆12Aug 8, 2021Updated 4 years ago