Code Repo for the NeurIPS 2023 paper "VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models"
☆28Sep 18, 2025Updated 6 months ago
Alternatives and similar repositories for VillanDiffusion
Users that are interested in VillanDiffusion are comparing it to the libraries listed below
Sorting:
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- [ECCV'24] T2IShield: Defending Against Backdoors on Text-to-Image Diffusion Models☆17Dec 21, 2025Updated 2 months ago
- ☆60Nov 24, 2022Updated 3 years ago
- [ICCV 2023] Source code for our paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".☆65Nov 20, 2023Updated 2 years ago
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆23Mar 23, 2024Updated last year
- ☆13Nov 22, 2024Updated last year
- ☆13May 1, 2024Updated last year
- ☆11Dec 18, 2024Updated last year
- ☆32Sep 3, 2024Updated last year
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Apr 19, 2024Updated last year
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆31Aug 14, 2025Updated 7 months ago
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆35Apr 5, 2025Updated 11 months ago
- ICML2025: One Image is Worth a Thousand Words: A Usability Preservable Text-Image Collaborative Erasing Framework☆14Jun 24, 2025Updated 8 months ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆28Apr 15, 2025Updated 11 months ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆63May 8, 2023Updated 2 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- ☆21Oct 25, 2023Updated 2 years ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Dec 24, 2023Updated 2 years ago
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆38Aug 6, 2024Updated last year
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆48Apr 27, 2022Updated 3 years ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆25May 25, 2023Updated 2 years ago
- Official Code for reproductivity of the NeurIPS 2023 paper: Adversarial Examples Are Not Real Features☆16Jun 27, 2024Updated last year
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆66Apr 24, 2024Updated last year
- Official PyTorch implementation of "MM-PoisonRAG: Disrupting Multimodal RAG with Local and Global Poisoning Attacks"☆12Dec 4, 2025Updated 3 months ago
- ☆13Mar 11, 2026Updated last week
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- WOUAF: Weight Modulation for User Attribution and Fingerprinting in Text-to-Image Diffusion Models (CVPR 2024)☆26Jun 14, 2024Updated last year
- Official repository for "PostMark: A Robust Blackbox Watermark for Large Language Models"☆27Aug 30, 2024Updated last year
- [ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining☆19Feb 26, 2025Updated last year
- Identification of the Adversary from a Single Adversarial Example (ICML 2023)☆10Jul 15, 2024Updated last year
- ☆32Mar 4, 2022Updated 4 years ago
- Backdoor Stuff in AI/ ML domain☆35Mar 7, 2026Updated last week
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆23Jan 9, 2025Updated last year
- ☆16Jan 28, 2024Updated 2 years ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- [NeurIPS'25] Backdoor Cleaning without External Guidance in MLLM Fine-tuning☆18Oct 13, 2025Updated 5 months ago