Grand Challenge at ACM Multimedia 2025
The AADD-2025 Challenge investigated adversarial vulnerabilities of deepfake detection models by generating adversarial perturbed deepfake images that evade standard classifiers while maintaining high visual similarity to the original deepfake content. Given the increasing reliance on deepfake detectors in forensic analysis and content moderation, ensuring their robustness against adversarial attacks has relevant importance.
The goal of this challenge was to expose and address vulnerabilities in current deepfake detection systems by designing adversarial attacks that alter deepfake images, rendering them unrecognizable as synthetic content to 4 proposed classifiers, preserving high visual similarity to the original images.
Participants were provided with a dataset divided into sixteen subsets:
- 4 GAN-based models (high quality)
- 4 Diffusion-based models (high quality)
- 4 GAN-based models (low quality)
- 4 Diffusion-based models (low quality)
- Dataset
โโโ train
โ โโโ fake
โ โ โโโ hq
โ โ โ โโโ Adobe Firefly
โ โ โ โโโ Deep AI
โ โ โ โโโ Flux.1.1 Pro
โ โ โ โโโ Hotpot AI
โ โ โ โโโ Nvidia Sana PAG
โ โ โ โโโ Stable Diffusion 3.5
โ โ โ โโโ StyleGAN2
โ โ โ โโโ StyleGAN3
โ โ โ โโโ Tencent Hunyuan
โ โ โโโ lq
โ โ โโโ Deep AI
โ โ โโโ Flux.1
โ โ โโโ Freepik
โ โ โโโ Hotpot AI
โ โ โโโ Nvidia Sana PAG
โ โ โโโ Stable Diffusion Attend and Excite
โ โ โโโ StyleGAN
โ โ โโโ StyleGAN3
โ โ โโโ Tencent Hunyuan
โ โโโ real
โ โโโ hq
โ โ โโโ ffhq
โ โโโ lq
โ โโโ celeba_hq
โโโ test
โโโ fake
โ โโโ hq
โ โ โโโ Adobe Firefly
โ โ โโโ Deep AI
โ โ โโโ Flux.1.1 Pro
โ โ โโโ Hotpot AI
โ โ โโโ Nvidia Sana PAG
โ โ โโโ Stable Diffusion 3.5
โ โ โโโ StyleGAN2
โ โ โโโ StyleGAN3
โ โ โโโ Tencent Hunyuan
โ โโโ lq
โ โโโ Deep AI
โ โโโ Flux.1
โ โโโ Freepik
โ โโโ Hotpot AI
โ โโโ Nvidia Sana PAG
โ โโโ Stable Diffusion Attend and Excite
โ โโโ StyleGAN
โ โโโ StyleGAN3
โ โโโ Tencent Hunyuan
โโโ real
โโโ hq
โ โโโ ffhq
โโโ lq
โโโ celeba_hq
Note: Participants had to focus on the entire dataset across all subsets.
- Adversarial Images: Submit the generated adversarial deepfake images
- Technical Abstract: Provide a detailed description of your methodology
- Results Documentation: Include performance metrics and analysis
Final Evaluation Scripts See here
The challenge ended with strong global participation. Here are the final standings:
| Rank | Team Name | Organization/Institution | Final Score |
|---|---|---|---|
| ๐ฅ 1st | MR-CAS | ๐จ๐ณ University of Chinese Academy of Sciences | 2740 |
| ๐ฅ 2nd | Safe AI | ๐ฐ๐ท UNIST (Ulsan National Institute of Science and Technology) | 2709 |
| ๐ฅ 3rd | RoMa | ๐ฉ๐ช Fraunhofer SIT | ATHENE Center | 2679 |
| 4th | GRADIANT | ๐ช๐ธ Gradiant | 2631 |
| 5th | DASH | ๐ฐ๐ท Sungkyunkwan University | 2618 |
| 6th | SecureML | ๐ฎ๐น University of Cagliari | 2490 |
| 7th | MICV | ๐จ๐ณ Ant Group | 2434 |
| 8th | WHU_PB | ๐จ๐ณ Wuhan University | 2354 |
| 9th | The Adversaries | ๐ธ๐ฌ Singapore Institute of Technology | 2341 |
| 10th | DeFakePol | ๐ต๐ฑ Samsung Research Poland | 1665 |
| 11th | False Negative | ๐จ๐ณ The Hong Kong Polytechnic University | 1602 |
| 12th | VYAKRITI 2.0 | ๐ฎ๐ณ Apex Institute of technology Chandigarh University | 1041 |
| 13th | MILab | ๐จ๐ณ University of Science and Technology of China | 110 |
The AADD-2025 Challenge followed this timeline:
- โ March 03, 2025: Competition Website Launch
- โ March 15 - May 22, 2025: Registration Period (Extended)
- โ April 10, 2025: Test Set and Classificator Release
- โ June 15, 2025: Final Submission Deadline
- โ June 22, 2025: Leaderboard Publication and Rankings Release
- โ June 30, 2025: Paper Submission Deadline (Top 3 Teams Only)
- โณ July 24, 2025: Announcement regarding full paper submission
- โณ August 01, 2025: Camera ready - Grand Challenge Solutions (Top 3 Teams Only)
- โณ ACM Multimedia 2025: Conference & Winners Recognition
The top 3 teams were invited to submit full-length papers describing their methods in detail. These papers underwent a rigorous review process managed by the challenge organizers, with accepted papers included in the ACM Multimedia 2025 proceedings.
| Name | Role | Affiliation | |
|---|---|---|---|
| Luca Guarnera | Research Fellow | [email protected] | Department of Mathematics and Computer Science, University of Catania, Italy |
| Francesco Guarnera | Research Fellow | [email protected] | Department of Mathematics and Computer Science, University of Catania, Italy |
| Name | Role | Affiliation | |
|---|---|---|---|
| Sebastiano Battiato | Full Professor | [email protected] | Department of Mathematics and Computer Science, University of Catania, Italy |
| Giovanni Puglisi | Associate Professor | [email protected] | Department of Mathematics and Informatics, University of Cagliari, Italy |
| Zahid Akhtar | Associate Professor | [email protected] | State University of New York Polytechnic Institute, USA |
| Name | Role | Affiliation | |
|---|---|---|---|
| Mirko Casu | PhD Student | [email protected] | Department of Mathematics and Computer Science, University of Catania, Italy |
| Orazio Pontorno | PhD Student | [email protected] | Department of Mathematics and Computer Science, University of Catania, Italy |
| Claudio Vittorio Ragaglia | PhD Student | [email protected] | Department of Mathematics and Computer Science, University of Catania, Italy |
Main Contact: Mirko Casu
Email: [email protected]
Dataset Attribution: Part of this challenge dataset is based on the WILD dataset. If you use the data, please also cite:
@misc{bongini2025wildnewinthewildimage,
title={WILD: a new in-the-Wild Image Linkage Dataset for synthetic image attribution},
author={Pietro Bongini and Sara Mandelli and Andrea Montibeller and Mirko Casu and Orazio Pontorno and Claudio Vittorio Ragaglia and Luca Zanchetta and Mattia Aquilina and Taiba Majid Wani and Luca Guarnera and Benedetta Tondi and Giulia Boato and Paolo Bestagini and Irene Amerini and Francesco De Natale and Sebastiano Battiato and Mauro Barni},
year={2025},
eprint={2504.19595},
archivePrefix={arXiv},
primaryClass={cs.MM},
url={https://arxiv.org/abs/2504.19595},
}If you use or refer to this challenge, please cite our ACM Multimedia 2025 paper:
@inproceedings{battiato2025adversarial,
title={Adversarial Attacks on Deepfake Detectors: A Challenge in the Era of AI-Generated Media (AADD-2025)},
author={Battiato, Sebastiano and Casu, Mirko and Guarnera, Francesco and Guarnera, Luca and Puglisi, Giovanni and Pontorno, Orazio and Ragaglia, Claudio Vittorio and Akhtar, Zahid},
booktitle={Proceedings of the 33rd ACM International Conference on Multimedia},
pages={13714--13719},
year={2025}
}Institutional Affiliations:
- University of Catania - Department of Mathematics and Computer Science
- University of Cagliari - Department of Mathematics and Informatics
- State University of New York Polytechnic Institute - Website
ยฉ 2025 University of Catania.
Powered by the Multimedia Security and Forensics group of the Image Processing Laboratory (IPLAB).
Deepfake Detection, Adversarial Attacks, Computer Vision, Digital Forensics, AI Security, Media Authentication, Challenge Competition, ACM Multimedia