Code Repo for the NeurIPS 2023 paper "VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models"
☆29Sep 18, 2025Updated 8 months ago
Alternatives and similar repositories for VillanDiffusion
Users that are interested in VillanDiffusion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- [ECCV'24] T2IShield: Defending Against Backdoors on Text-to-Image Diffusion Models☆17Dec 21, 2025Updated 4 months ago
- [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆27Aug 1, 2025Updated 9 months ago
- ☆60Nov 24, 2022Updated 3 years ago
- [ICCV 2023] Source code for our paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".☆65Nov 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆24Mar 23, 2024Updated 2 years ago
- ☆13May 1, 2024Updated 2 years ago
- ☆11Dec 18, 2024Updated last year
- ☆32Sep 3, 2024Updated last year
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Apr 19, 2024Updated 2 years ago
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆34Apr 5, 2025Updated last year
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆29Apr 15, 2025Updated last year
- ICML2025: One Image is Worth a Thousand Words: A Usability Preservable Text-Image Collaborative Erasing Framework☆15Jun 24, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆64May 8, 2023Updated 3 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- ☆21Oct 25, 2023Updated 2 years ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Dec 24, 2023Updated 2 years ago
- A Homomorphic Encryption-Driven Python Framework for Secure Cloud-Based Facial Recognition☆19May 13, 2026Updated last week
- Simplified Chinese localization for Esoteric Ebb | 奥秘消退简体中文汉化补丁☆74May 4, 2026Updated 2 weeks ago
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆38Aug 6, 2024Updated last year
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆48Apr 27, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Github repo for One-shot Neural Backdoor Erasing via Adversarial Weight Masking (NeurIPS 2022)☆15Jan 3, 2023Updated 3 years ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- Code for paper "Universal Jailbreak Backdoors from Poisoned Human Feedback"☆65Apr 24, 2024Updated 2 years ago
- Official Code for reproductivity of the NeurIPS 2023 paper: Adversarial Examples Are Not Real Features☆16Jun 27, 2024Updated last year
- Official PyTorch implementation of "MM-PoisonRAG: Disrupting Multimodal RAG with Local and Global Poisoning Attacks"☆15Dec 4, 2025Updated 5 months ago
- Code for the paper "The Journey, Not the Destination: How Data Guides Diffusion Models"☆25Dec 12, 2023Updated 2 years ago
- ☆13Mar 11, 2026Updated 2 months ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Official repository for "PostMark: A Robust Blackbox Watermark for Large Language Models"☆28Aug 30, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Private Adaptive Optimization with Side Information (ICML '22)☆16Jun 23, 2022Updated 3 years ago
- [ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining☆20Feb 26, 2025Updated last year
- ☆12Apr 18, 2023Updated 3 years ago
- Identification of the Adversary from a Single Adversarial Example (ICML 2023)☆10Jul 15, 2024Updated last year
- ☆32Mar 4, 2022Updated 4 years ago
- Backdoor Stuff in AI/ ML domain☆36Updated this week
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆26Jan 9, 2025Updated last year