unformal implementation of advdiffuser
☆17Feb 4, 2024Updated 2 years ago
Alternatives and similar repositories for advdiff_impl
Users that are interested in advdiff_impl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆22Oct 29, 2025Updated 6 months ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆119Oct 31, 2023Updated 2 years ago
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- SSH connection tool, supporting remote SSH command execution, uploading, downloading files, and reconnecting after disconnection. Support…☆20Dec 18, 2025Updated 5 months ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆101Apr 30, 2021Updated 5 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Mar 16, 2022Updated 4 years ago
- ☆14Jun 19, 2024Updated last year
- The code of the ICLR 2024 paper: Adversarial Training on Purification (AToP): Advancing Both Robustness and Generalization☆10Nov 21, 2024Updated last year
- ☆47Apr 7, 2025Updated last year
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆27Feb 13, 2023Updated 3 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- GI-PIP: Do We Require Impractical Auxiliary Dataset for Gradient Inversion Attacks? (ICASSP 2024)☆16Apr 18, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Official PyTorch Implementation for InfoSwap☆111Feb 16, 2022Updated 4 years ago
- ☆15Dec 9, 2024Updated last year
- Official codes for "Understanding Deep Gradient Leakage via Inversion Influence Functions", NeurIPS 2023☆15Oct 13, 2023Updated 2 years ago
- ☆11Jul 14, 2023Updated 2 years ago
- ☆22Sep 23, 2025Updated 7 months ago
- ☆43Oct 9, 2024Updated last year
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆340Jan 29, 2023Updated 3 years ago
- Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)☆16Mar 25, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository contains the speaker labeled information of VoxCeleb2 and LRS3 audio-visual datasets. (AAAI 2025)☆13Sep 6, 2024Updated last year
- ☆11Oct 30, 2024Updated last year
- Tutorials for MATH 4432 Statistical Machine Learning, HKUST, Fall 2022☆11Sep 17, 2024Updated last year
- Implementation for the works "VecGAN: Image-to-Image Translation with Interpretable Latent Directions" (ECCV 2022) and "Face Attribute Ed…☆53Oct 16, 2023Updated 2 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆264Nov 23, 2025Updated 5 months ago
- Region-Based Optimization in Continual Learning for Audio Deepfake Detection☆13Dec 17, 2024Updated last year
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 5 months ago
- ☆12Nov 25, 2023Updated 2 years ago
- BS-Mamba for Black-Soil Area Detection on the Qinghai-Tibetan Plateau☆12Apr 12, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆75Apr 28, 2025Updated last year
- Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks☆13Feb 15, 2022Updated 4 years ago
- TraceableSpeech: Towards Proactively Traceable Text-to-Speech with Watermarking☆21Apr 18, 2025Updated last year
- Official implementation for the paper "Unlocking the Hidden Potential of CLIP in Generalizable Deepfake Detection".☆75Nov 17, 2025Updated 6 months ago
- ☆12Sep 8, 2023Updated 2 years ago
- A template website for presenting your reproducible website☆16Apr 12, 2023Updated 3 years ago
- [ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation☆59Dec 12, 2022Updated 3 years ago