code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI"
β35May 23, 2024Updated last year
Alternatives and similar repositories for Impress
Users that are interested in Impress are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]β23Apr 2, 2024Updated last year
- π‘οΈ[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attackβ62Apr 7, 2024Updated last year
- Investigating and Defending Shortcut Learning in Personalized Diffusion Modelsβ13Nov 19, 2024Updated last year
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learningβ28Nov 19, 2024Updated last year
- β50Jun 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)β18Mar 31, 2025Updated last year
- β27Aug 7, 2024Updated last year
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Modelsβ11Oct 12, 2024Updated last year
- A curated list of awesome Unlearnable Example papers resources.β13Dec 14, 2025Updated 3 months ago
- All in How You Ask for It: Simple Black-Box Method for Jailbreak Attacksβ18Apr 24, 2024Updated last year
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)β44May 18, 2025Updated 10 months ago
- β14Dec 31, 2024Updated last year
- Official implementation of "Prompt-Agnostic Adversarial Perturbation for Customized Diffusion Models"β25May 30, 2025Updated 10 months ago
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purificationβ16Oct 31, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- β15Dec 12, 2022Updated 3 years ago
- β60Nov 24, 2022Updated 3 years ago
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.β12Jun 20, 2023Updated 2 years ago
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptationβ17Jan 17, 2025Updated last year
- Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)β16Mar 25, 2024Updated 2 years ago
- Raising the Cost of Malicious AI-Powered Image Editingβ669Feb 27, 2023Updated 3 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023β95Sep 17, 2025Updated 6 months ago
- β22Sep 5, 2025Updated 6 months ago
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbationsβ¦β336Jan 29, 2023Updated 3 years ago
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- PDM-based Purifierβ22Nov 5, 2024Updated last year
- [ECCV 2024] Towards Reliable Evaluation and Fast Training of Robust Semantic Segmentation Modelsβ21Jul 17, 2024Updated last year
- A watermarking tool to protect human artworks from being used in synthetic artworks.β629May 30, 2025Updated 10 months ago
- Implement Code for UniMix and Bayias Compensated Lossβ19Mar 7, 2023Updated 3 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systemsβ28Apr 1, 2021Updated 4 years ago
- π₯ Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeatiβ¦β70Aug 14, 2025Updated 7 months ago
- EraseDiff: Erasing Data Influence in Diffusion Modelsβ14Nov 20, 2024Updated last year
- [ICLR 2022] Official repository for "Robust Unlearnable Examples: Protecting Data Against Adversarial Learning"β50Jul 20, 2024Updated last year
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"β92Jul 24, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ICML2025: One Image is Worth a Thousand Words: A Usability Preservable Text-Image Collaborative Erasing Frameworkβ14Jun 24, 2025Updated 9 months ago
- β23Feb 5, 2026Updated last month
- [CVPR 2025] Six-CD: Benchmarking Concept Removals for Benign Text-to-image Diffusion Modelsβ16Jan 8, 2026Updated 2 months ago
- Official Code for ICLR2022 Paper: Chaos is a Ladder: A New Theoretical Understanding of Contrastive Learning via Augmentation Overlapβ28Sep 28, 2025Updated 6 months ago
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"β31Aug 14, 2025Updated 7 months ago
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processesβ12Jun 12, 2023Updated 2 years ago
- GPU accelerated Perlin Noise in pythonβ11Oct 23, 2020Updated 5 years ago