[ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation
☆59Dec 12, 2022Updated 3 years ago
Alternatives and similar repositories for TAFIM
Users that are interested in TAFIM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆47Nov 17, 2022Updated 3 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆39Jun 14, 2023Updated 2 years ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆110May 6, 2024Updated 2 years ago
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆22Oct 29, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 4DContrast: Contrastive Learning with Dynamic Correspondences for 3D Scene Understanding, ECCV 2022☆17Jul 19, 2022Updated 3 years ago
- Official pytorch implementation of WACV 2023 Paper "Proactive Deepfake Defence via Identity Watermarking" for both training and evaluatio…☆24Feb 21, 2023Updated 3 years ago
- ☆15Feb 26, 2023Updated 3 years ago
- DeepSafe: The Dual Shield for Deepfake Security☆22Feb 11, 2025Updated last year
- ☆26Nov 7, 2023Updated 2 years ago
- ManiCLIP: Multi-Attribute Face Manipulation from Text☆24Nov 6, 2023Updated 2 years ago
- CLIP meets faces.☆25May 12, 2022Updated 3 years ago
- ☆12Nov 25, 2023Updated 2 years ago
- Towards Part-Based Understanding of RGB-D Scans☆30Apr 29, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple tutorial on adversarial attacks against deep neural networks☆38Nov 10, 2025Updated 5 months ago
- ☆67Mar 6, 2023Updated 3 years ago
- Official PyTorch Implementation for G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors (TIFS-2024)☆17Aug 27, 2024Updated last year
- GTAR l2l generator unlearning project☆17May 6, 2024Updated 2 years ago
- Anti-DreamBooth: Protecting users from personalized text-to-image synthesis (ICCV 2023)☆268Mar 27, 2026Updated last month
- [ICCV 2023] Code for "Distracting Downpour: Adversarial Weather Attacks for Motion Estimation"☆19Aug 17, 2023Updated 2 years ago
- ☆36Apr 7, 2022Updated 4 years ago
- [IJCV 2025] Code for DeepFake-Adapter: Dual-Level Adapter for DeepFake Detection☆61Dec 24, 2024Updated last year
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆126Apr 16, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Official implementation of the paper "GANprintR: Improved Fakes and Evaluation of the State-of-the-Art in Face Manipulation Detection"☆25Apr 17, 2020Updated 6 years ago
- The official code for paper "Stacking Brick by Brick: Aligned Feature Isolation for Incremental Face Forgery Detection" (CVPR 2025)☆26Aug 15, 2025Updated 8 months ago
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆31Jun 12, 2025Updated 10 months ago
- ☆109Oct 23, 2022Updated 3 years ago
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- [SIGGRAPH 2023] ClipFace: Text-guided Editing of Textured 3D Morphable Models☆198Jul 3, 2023Updated 2 years ago
- unformal implementation of advdiffuser☆17Feb 4, 2024Updated 2 years ago
- Implementation of "Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations"☆30Jun 21, 2022Updated 3 years ago
- SeeABLE: Soft Discrepancies and Bounded Contrastive Learning for Exposing Deepfakes☆20Jun 1, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Code of masked relation learning for deepfake detection☆29May 25, 2024Updated last year
- Code for the paper "Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks"☆40Jun 20, 2024Updated last year
- ☆27Aug 7, 2024Updated last year
- ☆15Nov 24, 2023Updated 2 years ago
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated 2 years ago
- ArXiv'18 implementation of amortized maximum likelihood (AML) for high-quality, weakly-supervised shape completion.☆11Nov 30, 2018Updated 7 years ago
- Simple MLP for representing the SDF of a single shape☆17Jun 30, 2023Updated 2 years ago