[ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation
☆58Dec 12, 2022Updated 3 years ago
Alternatives and similar repositories for TAFIM
Users that are interested in TAFIM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆47Nov 17, 2022Updated 3 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆39Jun 14, 2023Updated 2 years ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆109May 6, 2024Updated last year
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆22Oct 29, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This is the official code for "Learning Multi-Resolution Patch Priors for 3D Shape Completion on Unseen Categories"☆51Oct 16, 2023Updated 2 years ago
- 🔥🔥Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networks☆347May 7, 2020Updated 5 years ago
- 4DContrast: Contrastive Learning with Dynamic Correspondences for 3D Scene Understanding, ECCV 2022☆17Jul 19, 2022Updated 3 years ago
- Official pytorch implementation of WACV 2023 Paper "Proactive Deepfake Defence via Identity Watermarking" for both training and evaluatio…☆24Feb 21, 2023Updated 3 years ago
- ☆15Feb 26, 2023Updated 3 years ago
- ☆33Jun 4, 2022Updated 3 years ago
- DeepSafe: The Dual Shield for Deepfake Security☆22Feb 11, 2025Updated last year
- ☆26Nov 7, 2023Updated 2 years ago
- ManiCLIP: Multi-Attribute Face Manipulation from Text☆24Nov 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CLIP meets faces.☆25May 12, 2022Updated 3 years ago
- ☆12Nov 25, 2023Updated 2 years ago
- A simple tutorial on adversarial attacks against deep neural networks☆37Nov 10, 2025Updated 5 months ago
- Towards Part-Based Understanding of RGB-D Scans☆30Apr 29, 2025Updated 11 months ago
- Official PyTorch Implementation for G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors (TIFS-2024)☆17Aug 27, 2024Updated last year
- Anti-DreamBooth: Protecting users from personalized text-to-image synthesis (ICCV 2023)☆268Mar 27, 2026Updated 3 weeks ago
- ☆36Apr 7, 2022Updated 4 years ago
- [CVPR 2022 Oral] Detecting Deepfakes with Self-Blended Images https://arxiv.org/abs/2204.08376☆258Mar 13, 2026Updated last month
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆126Apr 16, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Official implementation of the paper "GANprintR: Improved Fakes and Evaluation of the State-of-the-Art in Face Manipulation Detection"☆25Apr 17, 2020Updated 6 years ago
- The official code for paper "Stacking Brick by Brick: Aligned Feature Isolation for Incremental Face Forgery Detection" (CVPR 2025)☆26Aug 15, 2025Updated 8 months ago
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆30Jun 12, 2025Updated 10 months ago
- ☆109Oct 23, 2022Updated 3 years ago
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- unformal implementation of advdiffuser☆17Feb 4, 2024Updated 2 years ago
- SeeABLE: Soft Discrepancies and Bounded Contrastive Learning for Exposing Deepfakes☆20Jun 1, 2023Updated 2 years ago
- Code of masked relation learning for deepfake detection☆29May 25, 2024Updated last year
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for the paper "Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks"☆39Jun 20, 2024Updated last year
- ☆27Aug 7, 2024Updated last year
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated 2 years ago
- ArXiv'18 implementation of amortized maximum likelihood (AML) for high-quality, weakly-supervised shape completion.☆11Nov 30, 2018Updated 7 years ago
- Simple MLP for representing the SDF of a single shape☆17Jun 30, 2023Updated 2 years ago
- [CVPR 2021: Oral] In this work, we show that high frequency Fourier spectrum decay discrepancies are not inherent characteristics for exi…☆29Jun 12, 2021Updated 4 years ago
- Pytorch implementation for paper "Texturify: Generating Textures on 3D Shape Surfaces"☆16Dec 17, 2022Updated 3 years ago