shikiw / initiative-defense-for-deepfakeView external linksLinks
[AAAI 2021] Initiative Defense against Facial Manipulation
☆38Jun 14, 2023Updated 2 years ago
Alternatives and similar repositories for initiative-defense-for-deepfake
Users that are interested in initiative-defense-for-deepfake are comparing it to the libraries listed below
Sorting:
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆108May 6, 2024Updated last year
- ☆47Nov 17, 2022Updated 3 years ago
- [TIP 2024] PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition☆14Nov 30, 2023Updated 2 years ago
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- [CVPR 2022] Shape-invariant Adversarial Point Clouds☆48Nov 30, 2023Updated 2 years ago
- [ICCV 2023] Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting☆15Nov 30, 2023Updated 2 years ago
- [ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation☆58Dec 12, 2022Updated 3 years ago
- [CVPR 2023] Diversity-Aware Meta Visual Prompting☆84Nov 30, 2023Updated 2 years ago
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆18Oct 29, 2025Updated 3 months ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- Official pytorch implementation of WACV 2023 Paper "Proactive Deepfake Defence via Identity Watermarking" for both training and evaluatio…☆24Feb 21, 2023Updated 2 years ago
- ☆20Aug 7, 2023Updated 2 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆65Mar 8, 2024Updated last year
- ☆19Jan 10, 2024Updated 2 years ago
- [ICCV 2025] The official code of the paper "Deciphering Cross-Modal Alignment in Large Vision-Language Models with Modality Integration R…☆111Jul 9, 2025Updated 7 months ago
- ☆34Nov 16, 2025Updated 3 months ago
- ☆33Jun 4, 2022Updated 3 years ago
- A simple tutorial on adversarial attacks against deep neural networks☆32Nov 10, 2025Updated 3 months ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆19Jul 27, 2023Updated 2 years ago
- [NeurIPS 2025] Mask Image Watermarking (Official Implementation)☆43Nov 9, 2025Updated 3 months ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- Official implementation of "Prompt-Agnostic Adversarial Perturbation for Customized Diffusion Models"☆25May 30, 2025Updated 8 months ago
- ☆27Oct 17, 2022Updated 3 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Aug 4, 2021Updated 4 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24May 21, 2022Updated 3 years ago
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆115Jun 25, 2024Updated last year
- Anti-DreamBooth: Protecting users from personalized text-to-image synthesis (ICCV 2023)☆261Sep 30, 2025Updated 4 months ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- This repository collects the latest research progress of Privacy-Preserving Recommender Systems after 2018.☆30Nov 4, 2021Updated 4 years ago
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆118Mar 30, 2022Updated 3 years ago
- [CVPR 2024 Highlight] OPERA: Alleviating Hallucination in Multi-Modal Large Language Models via Over-Trust Penalty and Retrospection-Allo…☆396Aug 24, 2024Updated last year
- ☆34Dec 2, 2023Updated 2 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆127Apr 16, 2023Updated 2 years ago
- This is the code of ICLR 2022 Oral paper 'Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Au…☆30Oct 22, 2023Updated 2 years ago