Raising the Cost of Malicious AI-Powered Image Editing
☆674Feb 27, 2023Updated 3 years ago
Alternatives and similar repositories for photoguard
Users that are interested in photoguard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anti-DreamBooth: Protecting users from personalized text-to-image synthesis (ICCV 2023)☆268Mar 27, 2026Updated last month
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆25Apr 2, 2024Updated 2 years ago
- Watermark you artworks to stay away from unauthorized diffusion style mimicry!☆360May 30, 2025Updated 11 months ago
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆35May 23, 2024Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆63Apr 7, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆27Aug 7, 2024Updated last year
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆338Jan 29, 2023Updated 3 years ago
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆31Nov 19, 2024Updated last year
- ☆26Nov 7, 2023Updated 2 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆41Feb 29, 2024Updated 2 years ago
- ☆51Jun 19, 2024Updated last year
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆27Feb 13, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- [AAAI 2021] Initiative Defense against Facial Manipulation☆39Jun 14, 2023Updated 2 years ago
- ☆60Nov 24, 2022Updated 3 years ago
- Official Implementation of Safe Latent Diffusion for Text2Image☆97Apr 21, 2023Updated 3 years ago
- [NeurIPS-2023] Annual Conference on Neural Information Processing Systems☆226Dec 22, 2024Updated last year
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Jun 15, 2022Updated 3 years ago
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)☆18Mar 31, 2025Updated last year
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆20Aug 22, 2024Updated last year
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆110May 6, 2024Updated 2 years ago
- Improving Your Model Ranking on Chatbot Arena by Vote Rigging (ICML 2025)☆27Feb 25, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆34Sep 6, 2025Updated 8 months ago
- Erasing Concepts from Diffusion Models☆661Mar 26, 2026Updated last month
- ☆17Jul 25, 2022Updated 3 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆263Nov 23, 2025Updated 5 months ago
- ☆14Mar 4, 2024Updated 2 years ago
- ☆647Aug 4, 2023Updated 2 years ago
- ☆43Jan 15, 2025Updated last year
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- ☆14Dec 31, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Mar 28, 2026Updated last month
- Improved Few-Shot Jailbreaking Can Circumvent Aligned Language Models and Their Defenses (NeurIPS 2024)☆65Jan 11, 2025Updated last year
- ☆81Jul 23, 2024Updated last year
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆14Nov 19, 2024Updated last year
- ☆48Jul 14, 2024Updated last year
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆119Oct 31, 2023Updated 2 years ago
- A fast, effective data attribution method for neural networks in PyTorch☆237Nov 18, 2024Updated last year