taco-group / HFMFLinks
HFMF: Hierarchical Fusion Meets Multi-Stream Models for Deepfake Detection
☆13Updated 10 months ago
Alternatives and similar repositories for HFMF
Users that are interested in HFMF are comparing it to the libraries listed below
Sorting:
- Robust Camera Trace Extraction (TIFS'23)☆11Updated 2 years ago
- ☆11Updated last year
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆32Updated 5 months ago
- This is the official implementation of the paper titled "Comprehensive Comparison of Vision Transformers and Traditional Convolutional Ne…☆13Updated 8 months ago
- BusterX and BusterX++☆24Updated 3 weeks ago
- ☆29Updated 8 months ago
- [CVPR2025] Any-Resolution AI-Generated Image Detection by Spectral Learning☆48Updated 3 months ago
- ☆18Updated 2 months ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- ☆24Updated last year
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Updated 2 years ago
- AvatarShield: Visual Reinforcement Learning for Human-Centric Video Forgery Detection☆21Updated 5 months ago
- [ICLR 2025] Image watermarks are removable using controllable regeneration from clean noise☆22Updated 8 months ago
- ☆12Updated 9 months ago
- ☆20Updated last year
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆37Updated 6 months ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Updated 2 years ago
- Breaking Semantic Artifacts for Generalized AI-generated Image Detection☆18Updated 10 months ago
- ☆26Updated last month
- ☆12Updated 2 months ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Updated 2 years ago
- ☆14Updated 8 months ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆23Updated last year
- [IEEE TCSVT'24] Study of Subjective and Objective Naturalness Assessment of AI-Generated Images☆36Updated 5 months ago
- This code is the official implementation of WEvade.☆41Updated last year
- this is for the ACM MM paper---Backdoor Attack on Crowd Counting☆17Updated 3 years ago
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Updated last year
- We introduce AI-Face, the first million-scale AI-generated face dataset with demographic annotations, and conduct a comprehensive fairnes…☆69Updated 3 months ago
- ☆21Updated last year
- ☆19Updated last year