All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models.
☆13Sep 16, 2024Updated last year
Alternatives and similar repositories for BAGM
Users that are interested in BAGM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code Repo for the NeurIPS 2023 paper "VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models"☆28Sep 18, 2025Updated 6 months ago
- ☆11Dec 18, 2024Updated last year
- [ICCV 2023] Source code for our paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".☆65Nov 20, 2023Updated 2 years ago
- [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆26Aug 1, 2025Updated 7 months ago
- [MM '24] EvilEdit: Backdooring Text-to-Image Diffusion Models in One Second☆28Nov 19, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆31Aug 14, 2025Updated 7 months ago
- ICML2025: One Image is Worth a Thousand Words: A Usability Preservable Text-Image Collaborative Erasing Framework☆14Jun 24, 2025Updated 9 months ago
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Apr 19, 2024Updated last year
- Source code of paper "An Unforgeable Publicly Verifiable Watermark for Large Language Models" accepted by ICLR 2024☆34May 23, 2024Updated last year
- ☆16Dec 3, 2021Updated 4 years ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆27Nov 19, 2024Updated last year
- ☆14Jan 4, 2025Updated last year
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated last year
- ☆13Nov 22, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- 微芒虚拟区块链操作系统☆18Mar 2, 2023Updated 3 years ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆20Aug 10, 2024Updated last year
- ☆60Nov 24, 2022Updated 3 years ago
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆24Mar 23, 2024Updated 2 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago
- 哈工大计算机学院课程2020春信息安全概论☆11Jun 24, 2020Updated 5 years ago
- WOUAF: Weight Modulation for User Attribution and Fingerprinting in Text-to-Image Diffusion Models (CVPR 2024)☆26Jun 14, 2024Updated last year
- [ACL 2025] Research code for the paper "OS-Kairos: Adaptive Interaction for MLLM-Powered GUI Agents"☆19Jun 19, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [ECCV'24] T2IShield: Defending Against Backdoors on Text-to-Image Diffusion Models☆17Dec 21, 2025Updated 3 months ago
- ☆12Apr 18, 2023Updated 2 years ago
- 使用Transformer进行中英翻译(demo)☆17Aug 25, 2023Updated 2 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- ☆17Feb 26, 2024Updated 2 years ago
- ☆32Mar 4, 2022Updated 4 years ago
- ☆12Sep 24, 2024Updated last year
- ☆10Feb 10, 2021Updated 5 years ago
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆23Jan 9, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of a Siamese Neural Network (in Tensorflow) that defines a similarity score between a pair of person images.☆12Sep 25, 2020Updated 5 years ago
- ☆16Jan 28, 2024Updated 2 years ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- ☆34Jun 14, 2023Updated 2 years ago
- ☆10Nov 22, 2022Updated 3 years ago
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆38May 26, 2025Updated 10 months ago
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Jul 18, 2023Updated 2 years ago