JWLiang007 / PFF

Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)
13 stars 0 forks source link

Question #3

Open zuiluorenjian opened 1 month ago

zuiluorenjian commented 1 month ago

Hello author, I have two small problems when reproducing. First, I see that there is an efficientnet-b4 detector in your source code, but your paper does not adopt this. I would like to ask why. When I implemented it, the effect did not seem to be very good. Second, regarding your comparison with other attack methods, I don’t see that it is reflected in the source code. I don’t know how the indicators are obtained. I may have more problems during the novice period. I am very sorry.

JWLiang007 commented 1 month ago

Hello,

  1. We utilized EfficientNet-B4 as the backbone for backdoor attack experiments on SBI, following the original SBI implementation. Additionally, please ensure that all settings, such as batch size and the number of images extracted from videos, adhere to our guidelines.

  2. We consider uploading baseline implementations to our repository at a later time. Alternatively, you can access various backdoor baseline implementations at BackdoorBench.

zuiluorenjian commented 1 month ago

OK ,Thank you very much