ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.01279
  4. Cited By
Disrupting Deepfakes: Adversarial Attacks Against Conditional Image
  Translation Networks and Facial Manipulation Systems
v1v2v3 (latest)

Disrupting Deepfakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems

3 March 2020
Nataniel Ruiz
Sarah Adel Bargal
Stan Sclaroff
    PICVAAML
ArXiv (abs)PDFHTMLGithub (334★)

Papers citing "Disrupting Deepfakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems"

50 / 56 papers shown
LoRA Patching: Exposing the Fragility of Proactive Defenses against Deepfakes
LoRA Patching: Exposing the Fragility of Proactive Defenses against DeepfakesIEEE Signal Processing Letters (IEEE SPL), 2025
Zuomin Qu
Yimao Guo
Qianyue Hu
Wei Lu
AAML
184
0
0
04 Oct 2025
Towards Imperceptible Adversarial Defense: A Gradient-Driven Shield against Facial Manipulations
Towards Imperceptible Adversarial Defense: A Gradient-Driven Shield against Facial Manipulations
Yue Li
Linying Xue
Dongdong Lin
Qiushi Li
Hui Tian
Hongxia Wang
AAML
155
1
0
02 Oct 2025
Towards Robust Defense against Customization via Protective Perturbation Resistant to Diffusion-based Purification
Towards Robust Defense against Customization via Protective Perturbation Resistant to Diffusion-based Purification
Wenkui Yang
Jie Cao
Junxian Duan
Ran He
DiffMAAMLWIGM
368
0
0
17 Sep 2025
Disruptive Attacks on Face Swapping via Low-Frequency Perceptual Perturbations
Disruptive Attacks on Face Swapping via Low-Frequency Perceptual Perturbations
Mengxiao Huang
Minglei Shu
Shuwang Zhou
Zhaoyang Liu
AAMLPICV
256
0
0
28 Aug 2025
Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head Generation
Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head GenerationComputer Vision and Pattern Recognition (CVPR), 2025
Yuan Gan
Jiaxu Miao
Yunze Wang
Yi Yang
AAMLDiffM
255
4
0
02 Jun 2025
WaveGuard: Robust Deepfake Detection and Source Tracing via Dual-Tree Complex Wavelet and Graph Neural Networks
WaveGuard: Robust Deepfake Detection and Source Tracing via Dual-Tree Complex Wavelet and Graph Neural Networks
Ziyuan He
Zhiqing Guo
Liejun Wang
Gaobo Yang
Yunfeng Diao
Dan Ma
687
2
0
13 May 2025
A Knowledge-guided Adversarial Defense for Resisting Malicious Visual Manipulation
A Knowledge-guided Adversarial Defense for Resisting Malicious Visual ManipulationIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2025
Dawei Zhou
Suzhi Gang
Decheng Liu
Tongliang Liu
N. Wang
Xinbo Gao
AAML
426
1
0
11 Apr 2025
NullSwap: Proactive Identity Cloaking Against Deepfake Face Swapping
NullSwap: Proactive Identity Cloaking Against Deepfake Face Swapping
Tianyi Wang
Harry Cheng
Xiao Zhang
Yinglong Wang
PICV
437
8
0
24 Mar 2025
FaceSwapGuard: Safeguarding Facial Privacy from DeepFake Threats through Identity Obfuscation
FaceSwapGuard: Safeguarding Facial Privacy from DeepFake Threats through Identity Obfuscation
Li Wang
Zheng Li
Wei Wei
R. Beyah
Shanqing Guo
PICVAAML
413
3
0
15 Feb 2025
LampMark: Proactive Deepfake Detection via Training-Free Landmark
  Perceptual Watermarks
LampMark: Proactive Deepfake Detection via Training-Free Landmark Perceptual WatermarksACM Multimedia (MM), 2024
Tianyi Wang
Mengxiao Huang
Harry Cheng
Xiao Zhang
Zhiqi Shen
434
33
0
26 Nov 2024
Perturb, Attend, Detect and Localize (PADL): Robust Proactive Image
  Defense
Perturb, Attend, Detect and Localize (PADL): Robust Proactive Image DefenseIEEE Access (IEEE Access), 2024
Filippo Bartolucci
I. Masi
G. Lisanti
AAML
291
2
0
26 Sep 2024
Proactive Schemes: A Survey of Adversarial Attacks for Social Good
Proactive Schemes: A Survey of Adversarial Attacks for Social Good
Vishal Asnani
Xi Yin
Xiaoming Liu
AAML
430
2
0
24 Sep 2024
Deep Learning Technology for Face Forgery Detection: A Survey
Deep Learning Technology for Face Forgery Detection: A Survey
Lixia Ma
Puning Yang
Yuting Xu
Ziming Yang
Peipei Li
Huaibo Huang
323
19
0
22 Sep 2024
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking IdentificationIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2024
Zuomin Qu
Wei Lu
Xiangyang Luo
Qian Wang
Xiaochun Cao
AAMLPICV
486
3
0
20 Sep 2024
Disrupting Diffusion-based Inpainters with Semantic Digression
Disrupting Diffusion-based Inpainters with Semantic Digression
Geonho Son
Juhun Lee
Simon S. Woo
DiffM
217
10
0
14 Jul 2024
PID: Prompt-Independent Data Protection Against Latent Diffusion Models
PID: Prompt-Independent Data Protection Against Latent Diffusion ModelsInternational Conference on Machine Learning (ICML), 2024
Ang Li
Yichuan Mo
Mingjie Li
Yisen Wang
AAML
293
5
0
14 Jun 2024
Evolving from Single-modal to Multi-modal Facial Deepfake Detection: Progress and Challenges
Evolving from Single-modal to Multi-modal Facial Deepfake Detection: Progress and Challenges
Ping Liu
Qiqi Tao
Joey Tianyi Zhou
540
3
0
11 Jun 2024
U Can't Gen This? A Survey of Intellectual Property Protection Methods
  for Data in Generative AI
U Can't Gen This? A Survey of Intellectual Property Protection Methods for Data in Generative AI
Tanja Sarcevic
Alicja Karlowicz
Rudolf Mayer
Ricardo A. Baeza-Yates
Andreas Rauber
354
14
0
22 Apr 2024
ProMark: Proactive Diffusion Watermarking for Causal Attribution
ProMark: Proactive Diffusion Watermarking for Causal AttributionComputer Vision and Pattern Recognition (CVPR), 2024
Vishal Asnani
John Collomosse
Tu Bui
Xiaoming Liu
S. Agarwal
WIGMDiffM
478
31
0
14 Mar 2024
Copyright Protection in Generative AI: A Technical Perspective
Copyright Protection in Generative AI: A Technical Perspective
Jie Ren
Han Xu
Pengfei He
Yingqian Cui
Shenglai Zeng
...
Hongzhi Wen
Jiayuan Ding
Hui Liu
Yi Chang
Shucheng Zhou
DeLMO
411
59
0
04 Feb 2024
MITS-GAN: Safeguarding Medical Imaging from Tampering with Generative
  Adversarial Networks
MITS-GAN: Safeguarding Medical Imaging from Tampering with Generative Adversarial Networks
Giovanni Pasqualino
Luca Guarnera
A. Ortis
Sebastiano Battiato
MedIm
323
11
0
17 Jan 2024
Robust Identity Perceptual Watermark Against Deepfake Face Swapping
Robust Identity Perceptual Watermark Against Deepfake Face Swapping
Tianyi Wang
Mengxiao Huang
Harry Cheng
Bin Ma
Yinglong Wang
AAML
493
26
0
02 Nov 2023
PrObeD: Proactive Object Detection Wrapper
PrObeD: Proactive Object Detection WrapperNeural Information Processing Systems (NeurIPS), 2023
Vishal Asnani
Abhinav Kumar
Suya You
Xiaoming Liu
337
11
0
28 Oct 2023
FakeTracer: Catching Face-swap DeepFakes via Implanting Traces in
  Training
FakeTracer: Catching Face-swap DeepFakes via Implanting Traces in TrainingIEEE Transactions on Emerging Topics in Computing (IEEE TETC), 2023
Pu Sun
H. Qi
Yuezun Li
Siwei Lyu
CVBM
206
7
0
27 Jul 2023
LEAT: Towards Robust Deepfake Disruption in Real-World Scenarios via
  Latent Ensemble Attack
LEAT: Towards Robust Deepfake Disruption in Real-World Scenarios via Latent Ensemble AttackExpert systems with applications (ESWA), 2023
Joonkyo Shim
H. Yoon
DiffMAAML
254
5
0
04 Jul 2023
Building an Invisible Shield for Your Portrait against Deepfakes
Building an Invisible Shield for Your Portrait against Deepfakes
Jiazhi Guan
Tianshu Hu
Hang Zhou
Zhizhi Guo
Lirui Deng
Chengbin Quan
Errui Ding
Youjian Zhao
PICV
200
5
0
22 May 2023
SepMark: Deep Separable Watermarking for Unified Source Tracing and
  Deepfake Detection
SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake DetectionACM Multimedia (ACM MM), 2023
Xiaoshuai Wu
Xin Liao
Bo Ou
361
81
0
10 May 2023
Anti-DreamBooth: Protecting users from personalized text-to-image
  synthesis
Anti-DreamBooth: Protecting users from personalized text-to-image synthesisIEEE International Conference on Computer Vision (ICCV), 2023
T. Le
Hao Phung
Thuan Hoang Nguyen
Quan Dao
Ngoc N. Tran
Anh Tran
464
140
0
27 Mar 2023
Information-containing Adversarial Perturbation for Combating Facial
  Manipulation Systems
Information-containing Adversarial Perturbation for Combating Facial Manipulation SystemsIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
Yao Zhu
YueFeng Chen
Xiaodan Li
Rong Zhang
Xiang Tian
Bo Zheng
Yao-wu Chen
AAML
276
22
0
21 Mar 2023
Copyright Protection and Accountability of Generative AI:Attack,
  Watermarking and Attribution
Copyright Protection and Accountability of Generative AI:Attack, Watermarking and AttributionThe Web Conference (WWW), 2023
Haonan Zhong
Jiamin Chang
Ziyue Yang
Tingmin Wu
Pathum Chamikara Mahawaga Arachchige
Chehara Pathmabandu
Minhui Xue
156
58
0
15 Mar 2023
PoseExaminer: Automated Testing of Out-of-Distribution Robustness in
  Human Pose and Shape Estimation
PoseExaminer: Automated Testing of Out-of-Distribution Robustness in Human Pose and Shape EstimationComputer Vision and Pattern Recognition (CVPR), 2023
Qihao Liu
Adam Kortylewski
Alan Yuille
OODD
360
15
0
13 Mar 2023
Scapegoat Generation for Privacy Protection from Deepfake
Scapegoat Generation for Privacy Protection from DeepfakeInternational Conference on Information Photonics (ICIP), 2023
Gido Kato
Yoshihiro Fukuhara
Mariko Isogawa
Hideki Tsunashima
Hirokatsu Kataoka
Shigeo Morishima
PICV
151
2
0
06 Mar 2023
Feature Extraction Matters More: Universal Deepfake Disruption through
  Attacking Ensemble Feature Extractors
Feature Extraction Matters More: Universal Deepfake Disruption through Attacking Ensemble Feature Extractors
Long Tang
Dengpan Ye
Zhenhao Lu
Yunming Zhang
Shengshan Hu
Yue Xu
Chuanxi Chen
AAML
266
10
0
01 Mar 2023
Raising the Cost of Malicious AI-Powered Image Editing
Raising the Cost of Malicious AI-Powered Image EditingInternational Conference on Machine Learning (ICML), 2023
Hadi Salman
Alaa Khaddaj
Guillaume Leclerc
Andrew Ilyas
Aleksander Madry
DiffM
291
173
0
13 Feb 2023
UnGANable: Defending Against GAN-based Face Manipulation
UnGANable: Defending Against GAN-based Face ManipulationUSENIX Security Symposium (USENIX Security), 2022
Zheng Li
Ning Yu
A. Salem
Michael Backes
Mario Fritz
Yang Zhang
AAMLPICVCVBM
219
37
0
03 Oct 2022
Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal
Watermark Vaccine: Adversarial Attacks to Prevent Watermark RemovalEuropean Conference on Computer Vision (ECCV), 2022
Xinwei Liu
Jian Liu
Yang Bai
Jindong Gu
Tao Chen
Yang Liu
Xiaochun Cao
AAMLWIGM
180
35
0
17 Jul 2022
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack
  via Adversarial Perceptual-aware Perturbations
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware PerturbationsInternational Joint Conference on Artificial Intelligence (IJCAI), 2022
Run Wang
Zi-Shun Huang
Zhikai Chen
Li Liu
Jing Chen
Lina Wang
AAML
233
79
0
01 Jun 2022
Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Restricted Black-box Adversarial Attack Against DeepFake Face SwappingIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Junhao Dong
Yuan Wang
Jianhuang Lai
Xiaohua Xie
PICVAAML
273
81
0
26 Apr 2022
Proactive Image Manipulation Detection
Proactive Image Manipulation DetectionComputer Vision and Pattern Recognition (CVPR), 2022
Vishal Asnani
Xi Yin
Tal Hassner
Sijia Liu
Xiaoming Liu
383
58
0
29 Mar 2022
Protecting Facial Privacy: Generating Adversarial Identity Masks via
  Style-robust Makeup Transfer
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup TransferComputer Vision and Pattern Recognition (CVPR), 2022
Shengshan Hu
Xiaogeng Liu
Yechao Zhang
Minghui Li
L. Zhang
Hai Jin
Libing Wu
AAMLPICV
336
143
0
07 Mar 2022
Initiative Defense against Facial Manipulation
Initiative Defense against Facial ManipulationAAAI Conference on Artificial Intelligence (AAAI), 2021
Qidong Huang
Jie Zhang
Wenbo Zhou
Weiming Zhang
Nenghai Yu
AAML
273
79
0
19 Dec 2021
TAFIM: Targeted Adversarial Attacks against Facial Image Manipulations
TAFIM: Targeted Adversarial Attacks against Facial Image Manipulations
Shivangi Aneja
Lev Markhasin
Matthias Niessner
AAMLDiffMPICV
317
44
0
16 Dec 2021
Attack as the Best Defense: Nullifying Image-to-image Translation GANs
  via Limit-aware Adversarial Attack
Attack as the Best Defense: Nullifying Image-to-image Translation GANs via Limit-aware Adversarial Attack
Chin-Yuan Yeh
Hsi-Wen Chen
Hong-Han Shuai
De-Nian Yang
Ming-Syan Chen
AAML
131
34
0
06 Oct 2021
Fingerprinting Image-to-Image Generative Adversarial Networks
Fingerprinting Image-to-Image Generative Adversarial NetworksEuropean Symposium on Security and Privacy (EuroS&P), 2021
Guanlin Li
Guowen Xu
Han Qiu
Shangwei Guo
Run Wang
Jiwei Li
Tianwei Zhang
Rongxing Lu
WIGM
297
0
0
19 Jun 2021
Simulated Adversarial Testing of Face Recognition Models
Simulated Adversarial Testing of Face Recognition ModelsComputer Vision and Pattern Recognition (CVPR), 2021
Nataniel Ruiz
Adam Kortylewski
Weichao Qiu
Cihang Xie
Sarah Adel Bargal
Alan Yuille
Stan Sclaroff
AAMLCVBM
263
16
0
08 Jun 2021
CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for
  Combating Deepfakes
CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating DeepfakesAAAI Conference on Artificial Intelligence (AAAI), 2021
Hao Huang
Yongtao Wang
Zhaoyu Chen
Yuze Zhang
Yuheng Li
Zhi Tang
Wei Chu
Jingdong Chen
Weisi Lin
K. Ma
AAML
278
126
0
23 May 2021
MagDR: Mask-guided Detection and Reconstruction for Defending Deepfakes
MagDR: Mask-guided Detection and Reconstruction for Defending DeepfakesComputer Vision and Pattern Recognition (CVPR), 2021
Zhikai Chen
Lingxi Xie
Zehao Wu
Yong He
Bo Zhang
AAML
276
38
0
26 Mar 2021
Deepfake Forensics via An Adversarial Game
Deepfake Forensics via An Adversarial GameIEEE Transactions on Image Processing (TIP), 2021
Zhi Wang
Yiwen Guo
W. Zuo
AAML
202
51
0
25 Mar 2021
Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction
Landmark Breaker: Obstructing DeepFake By Disturbing Landmark ExtractionInternational Workshop on Information Forensics and Security (WIFS), 2020
Pu Sun
Yuezun Li
H. Qi
Siwei Lyu
195
20
0
01 Feb 2021
Practical No-box Adversarial Attacks against DNNs
Practical No-box Adversarial Attacks against DNNsNeural Information Processing Systems (NeurIPS), 2020
Qizhang Li
Yiwen Guo
Hao Chen
AAML
325
68
0
04 Dec 2020
12
Next
Page 1 of 2