GaozhengPei / FreqPureLinks
☆18Updated last month
Alternatives and similar repositories for FreqPure
Users that are interested in FreqPure are comparing it to the libraries listed below
Sorting:
- PyTorch implementation of “Purified and Unified Steganographic Networks” (CVPR 2024)☆40Updated last year
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Updated 2 years ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆37Updated 6 months ago
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆19Updated last year
- ☆17Updated last year
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆241Updated last year
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆23Updated last year
- [ICCV 2023] Towards Building More Robust Models with Frequency Bias☆19Updated last year
- Official implementation of the paper DiffDefence: defending against adversarial attacks via diffusion models. ICIAP 2023.☆19Updated last year
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆24Updated 5 months ago
- ☆29Updated last year
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆29Updated 4 months ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆23Updated last year
- Code for our CVPR 2023 paper: Black-Box Sparse Adversarial Attack via Multi-Objective Optimisation☆26Updated last year
- ☆42Updated 7 months ago
- Feature Separation and Recalibration (CVPR 2023 Highlights)☆34Updated last year
- ☆26Updated last year
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆16Updated last year
- ☆19Updated 7 months ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆56Updated last year
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆33Updated 7 months ago
- ☆19Updated last year
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆37Updated last year
- source code for "ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization"☆35Updated 8 months ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆34Updated 3 years ago
- Official code implement of Robust Classification via a Single Diffusion Model☆93Updated 8 months ago
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆34Updated 5 months ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆25Updated last year
- Breaking Semantic Artifacts for Generalized AI-generated Image Detection☆18Updated 10 months ago
- [NeurIPS 2023] Official PyTorch implementation for the paper "CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganog…☆145Updated last year