This does not include the code for the MagDR model used for robustness evaluation, nor for AttGAN, Identity Swap, Face Reenactment, or the FaderNetwork, which were also utilized to validate the proposed attack used in Table 1 of your paper. Can you give that code??
This does not include the code for the MagDR model used for robustness evaluation, nor for AttGAN, Identity Swap, Face Reenactment, or the FaderNetwork, which were also utilized to validate the proposed attack used in Table 1 of your paper. Can you give that code??