code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI"
β35May 23, 2024Updated last year
Alternatives and similar repositories for Impress
Users that are interested in Impress are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]β25Apr 2, 2024Updated 2 years ago
- π‘οΈ[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attackβ63Apr 7, 2024Updated 2 years ago
- Investigating and Defending Shortcut Learning in Personalized Diffusion Modelsβ14Nov 19, 2024Updated last year
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learningβ30Nov 19, 2024Updated last year
- β50Jun 19, 2024Updated last year
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)β18Mar 31, 2025Updated last year
- β27Aug 7, 2024Updated last year
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Modelsβ11Oct 12, 2024Updated last year
- Watermark you artworks to stay away from unauthorized diffusion style mimicry!β359May 30, 2025Updated 10 months ago
- A curated list of awesome Unlearnable Example papers resources.β13Dec 14, 2025Updated 4 months ago
- All in How You Ask for It: Simple Black-Box Method for Jailbreak Attacksβ18Apr 24, 2024Updated last year
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)β44May 18, 2025Updated 11 months ago
- β14Dec 31, 2024Updated last year
- (AAAI 2024) Transferable Adversarial Attacks for Object Detection using Object-Aware Significant Feature Distortionβ16Dec 13, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Official implementation of "Prompt-Agnostic Adversarial Perturbation for Customized Diffusion Models"β25May 30, 2025Updated 10 months ago
- code of paper "Defending Against Alignment-Breaking Attacks via Robustly Aligned LLM"β14Nov 17, 2023Updated 2 years ago
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purificationβ16Oct 31, 2023Updated 2 years ago
- β15Dec 12, 2022Updated 3 years ago
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.β12Jun 20, 2023Updated 2 years ago
- β60Nov 24, 2022Updated 3 years ago
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptationβ18Jan 17, 2025Updated last year
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attackβ31Jul 21, 2025Updated 8 months ago
- Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)β16Mar 25, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Raising the Cost of Malicious AI-Powered Image Editingβ672Feb 27, 2023Updated 3 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023β95Sep 17, 2025Updated 7 months ago
- Code for R-former: Legal Judgment Prediction via Relational Learning, accepted at SIGIR 2021.β23Feb 21, 2022Updated 4 years ago
- Code for KERM: Incorporating Explicit Knowledge in Pre-trained Language Models for Passage Re-ranking, accepted at SIGIR 2022.β19Oct 31, 2022Updated 3 years ago
- β22Sep 5, 2025Updated 7 months ago
- MelodySim: Measuring Melody-aware Music Similarity for Plagiarism Detectionβ28May 29, 2025Updated 10 months ago
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbationsβ¦β338Jan 29, 2023Updated 3 years ago
- PDM-based Purifierβ22Nov 5, 2024Updated last year
- [ECCV 2024] Towards Reliable Evaluation and Fast Training of Robust Semantic Segmentation Modelsβ21Jul 17, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Implement Code for UniMix and Bayias Compensated Lossβ19Mar 7, 2023Updated 3 years ago
- A watermarking tool to protect human artworks from being used in synthetic artworks.β634May 30, 2025Updated 10 months ago
- EraseDiff: Erasing Data Influence in Diffusion Modelsβ14Nov 20, 2024Updated last year
- [ICLR 2022] Official repository for "Robust Unlearnable Examples: Protecting Data Against Adversarial Learning"β50Jul 20, 2024Updated last year
- HSML Dynamic version for ICML 2019β12Jul 11, 2019Updated 6 years ago
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"β95Apr 8, 2026Updated last week
- β23Feb 5, 2026Updated 2 months ago