Hugging Face
Models
Datasets
Spaces
Community
Docs
Enterprise
Pricing
Log In
Sign Up
46.0
TFLOPS
67
6
CanQi Jin
likewendy
Follow
implank's profile picture
xiu-l's profile picture
Tonic's profile picture
20 followers
·
3 following
Deng-Xian-Sheng
AI & ML interests
SNN AGI
Recent Activity
replied
to
imnotkitty
's
post
2 days ago
In the Text-to-Video arena, Seedance 2.0 has first secured a spot in the LMArena Top 10, while Kling 3.0 has topped the Artificial Analysis leaderboard, with the Kling family claiming 7 spots in the top 15. Which one do you prefer?
replied
to
SeaWolf-AI
's
post
2 days ago
AI Is Training on Your Content Without Permission — Fight Back with Invisible Watermarks https://huggingface.co/spaces/FINAL-Bench/security-scan Most generative AI training data is crawled without consent. Your text gets summarized, images reprocessed, videos clipped — with no way to prove you're the original creator. Existing watermarks are either visible or wiped out by a single AI preprocessing pass. Detect Before, Track After Pre-embed — Detect theft without any watermark. Text plagiarism check, image similarity analysis (perceptual hash, SSIM, color histogram, feature matching), and video temporal matching catch copies, edits, and excerpts. Post-embed — Embed invisible multi-layer watermarks. If one layer is destroyed, others survive independently. Even full removal leaves forensic traces as evidence. Text: 4 Independent Layers Four mechanisms work simultaneously: zero-width Unicode characters at morpheme/word boundaries (Korean Kiwi + English NLP), style fingerprinting via synonym-ending-connective substitution, SHA-256 timestamped evidence packages, and punctuation-anchored micro-marks. Each layer uses a different Unicode category, so attacks on one cannot eliminate the others. Full bilingual support, zero readability impact. 34-Attack Defense 7 categories, 34 attacks simulated: Unicode normalization, invisible character removal, homoglyph substitution (9,619 confusables), and AI rewriting. Each scored on Signal (watermark survival) + Trace (forensic evidence of attack) — proving deliberate removal even when watermarks are destroyed. Image & Video Images: DCT frequency-domain watermarks surviving JPEG compression and resize. Videos: keyframe watermarking with temporal propagation and majority-vote extraction. Both support pre-embed similarity detection. Who Is This For Creators, rights holders needing legal evidence, media companies, and organizations tracking document leaks. Korean/English bilingual, open source, Gradio-based.
new
activity
15 days ago
moonshotai/Kimi-K2.5:
Can someone abliterate this model please
View all activity
Organizations
likewendy
's Spaces
3
Sort: Recently updated
Runtime error
Phi 4
💬
Chat with a friendly assistant
Sleeping
Meta Llama Llama 3.2 3B
🏆
Sleeping
2
Skywork O1 Open PRM Qwen 2.5 7B
💬
Skywork/Skywork-o1-Open-PRM-Qwen-2.5-7B