secml-lab-vt / EvolvingThreat-DeepfakeImageDetectView external linksLinks
Code and Datasets for the paper "An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape" [IEEE S&P, 2024]
☆20Jul 23, 2025Updated 6 months ago
Alternatives and similar repositories for EvolvingThreat-DeepfakeImageDetect
Users that are interested in EvolvingThreat-DeepfakeImageDetect are comparing it to the libraries listed below
Sorting:
- ☆23Feb 4, 2022Updated 4 years ago
- ☆20Apr 24, 2025Updated 9 months ago
- Source code of the paper: Exploring Multi-View Pixel Contrast for General and Robust Image Forgery Localization, IEEE TIFS 2025.☆25Aug 8, 2025Updated 6 months ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Mar 4, 2023Updated 2 years ago
- Mixture of Low-rank Experts for Transferable AI-Generated Image Detection☆26Mar 10, 2024Updated last year
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 5 years ago
- ☆11Dec 23, 2024Updated last year
- ☆117Dec 9, 2020Updated 5 years ago
- ☆36Oct 15, 2024Updated last year
- Ini kumpulan beberapa materi lab pada Digitalent Schoolarship Python Essentials 2019☆10Mar 27, 2022Updated 3 years ago
- 脱敏的毕业设计——网络安全课程实验仿真系统☆13May 19, 2021Updated 4 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Jun 29, 2025Updated 7 months ago
- 基于图像识别的宠物服务平台☆12May 8, 2022Updated 3 years ago
- Fifty advanced Python concepts☆15Feb 10, 2026Updated last week
- Learning to Combine Local and Global Image Information for Contactless Palmprint Recognition☆11Dec 7, 2021Updated 4 years ago
- This project aims to extract ROI like finger tip, Palmprint and Hand-geometry from a single hand image.☆10Aug 24, 2023Updated 2 years ago
- Code of Decomposition and Completion Network for Salient Object Detection, TIP 2021.☆10Mar 30, 2023Updated 2 years ago
- GAM-Depth: Self-Supervised Indoor Depth Estimation Leveraging a Gradient-Aware Mask and Semantic Constraints☆12Apr 15, 2024Updated last year
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆12May 6, 2023Updated 2 years ago
- Part-Object Relational Visual Saliency☆11Apr 14, 2022Updated 3 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- Layered Input Gradient Network for Image Denoising☆12Dec 12, 2021Updated 4 years ago
- Generate images of Chinese license plates☆11Feb 8, 2021Updated 5 years ago
- The codes for the paper of "A particle swarm optimization-based flexible convolutional auto-encoder for image classification" published b…☆10Jul 21, 2020Updated 5 years ago
- FREE Recommended Data Science Interview Prep Resources: YouTube videos, Books, Online coding, Continuing education, etc.☆14Jul 19, 2019Updated 6 years ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆11Jan 3, 2026Updated last month
- Record my learning progress.☆10Mar 1, 2022Updated 3 years ago
- ☆11Feb 22, 2024Updated last year
- This is a submission example for CelebA-Spoof Challenge participants.☆10Sep 8, 2020Updated 5 years ago
- Flask Web Interface to deploy ManTraNet and BusterNet for testing image manipulations☆10Jan 24, 2020Updated 6 years ago
- [AAAI 2025 Oral] ODDN: Addressing Unpaired Data Challenges in Open-World Deepfake Detection on Online Social Networks https://arxiv.org/…☆10Jun 25, 2025Updated 7 months ago
- [IJCV 2023] FlowNAS: Neural Architecture Search for Optical Flow Estimation☆16Feb 21, 2024Updated last year
- [VISAPP2024] Towards the Detection of Diffusion Model Deepfakes☆103Nov 20, 2024Updated last year
- Synthetic Images Analysis☆47Jul 13, 2023Updated 2 years ago
- ☆12Jun 7, 2022Updated 3 years ago
- ☆12Aug 23, 2019Updated 6 years ago
- This repository contains code for the method proposed in the paper: Two-stream Encoder-Decoder Network for Localizing Image Forgeries☆12Nov 12, 2021Updated 4 years ago
- [NDSS 2026] Official repo for Odysseus: Jailbreaking Commercial Multimodal LLM-integrated Systems via Dual Steganography☆29Jan 2, 2026Updated last month
- The official implementation code of EdgeRegNet.☆13Nov 29, 2024Updated last year