☆61Aug 9, 2023Updated 2 years ago
Alternatives and similar repositories for GuidedDiffusionPur
Users that are interested in GuidedDiffusionPur are comparing it to the libraries listed below
Sorting:
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆334Jan 29, 2023Updated 3 years ago
- ☆20Oct 5, 2023Updated 2 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆256Nov 23, 2025Updated 3 months ago
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆146Jul 31, 2023Updated 2 years ago
- Github repo for One-shot Neural Backdoor Erasing via Adversarial Weight Masking (NeurIPS 2022)☆15Jan 3, 2023Updated 3 years ago
- ☆16Feb 23, 2025Updated last year
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆30Oct 24, 2021Updated 4 years ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆116Oct 31, 2023Updated 2 years ago
- [ICML 2025] X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP☆37Feb 3, 2026Updated 3 weeks ago
- ☆23Oct 5, 2023Updated 2 years ago
- ☆24Dec 8, 2024Updated last year
- ☆20Sep 23, 2025Updated 5 months ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- PDM-based Purifier☆22Nov 5, 2024Updated last year
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Jun 30, 2020Updated 5 years ago
- Certified robustness "for free" using off-the-shelf diffusion models and classifiers☆44May 25, 2023Updated 2 years ago
- ☆30Dec 8, 2022Updated 3 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- The code of the ICLR 2024 paper: Adversarial Training on Purification (AToP): Advancing Both Robustness and Generalization☆10Nov 21, 2024Updated last year
- [ICCV 2023 Oral] Official implementation of "Robust Evaluation of Diffusion-Based Adversarial Purification"☆25Dec 3, 2023Updated 2 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆741May 16, 2024Updated last year
- Official code implement of Robust Classification via a Single Diffusion Model☆96Mar 7, 2025Updated 11 months ago
- Code for the paper Boosting Accuracy and Robustness of Student Models via Adaptive Adversarial Distillation (CVPR 2023).☆34May 26, 2023Updated 2 years ago
- Reproduces BPDA attack in pytorch☆13Oct 10, 2019Updated 6 years ago
- Git Repo with code and Dataset of the paper "On the use of Stable Diffusion for creating realistic faces: from generation to detection"☆15Mar 11, 2024Updated last year
- For easy metric logging and visualization☆14Jan 31, 2025Updated last year
- ☆59Nov 24, 2022Updated 3 years ago
- Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)☆16Mar 25, 2024Updated last year
- CVPR 2023 generalist☆16Oct 25, 2023Updated 2 years ago
- ICML 2024 Paper "Adversarial Robustness Limits via Scaling-Law and Human-Alignment Studies"☆17Jul 10, 2024Updated last year
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 7 months ago
- This is the source code for Detecting Adversarial Data by Probing Multiple Perturbations Using Expected Perturbation Score (ICML2023).☆40Oct 15, 2024Updated last year
- ☆23Jul 29, 2025Updated 7 months ago
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification☆16Oct 31, 2023Updated 2 years ago
- ☆21Jul 19, 2024Updated last year
- [NeurIPS 2023] Code for the paper "Revisiting Adversarial Training for ImageNet: Architectures, Training and Generalization across Threa…☆39Dec 3, 2024Updated last year
- ☆80Jul 23, 2024Updated last year
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- A hands-on & simple tutorial for out-of-distribution generalization.☆18Apr 23, 2022Updated 3 years ago