Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)
☆16Mar 25, 2024Updated last year
Alternatives and similar repositories for Revelio
Users that are interested in Revelio are comparing it to the libraries listed below
Sorting:
- ☆28Aug 7, 2024Updated last year
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆17Jan 17, 2025Updated last year
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆28Nov 19, 2024Updated last year
- PDM-based Purifier☆22Nov 5, 2024Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆61Apr 7, 2024Updated last year
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆13Nov 19, 2024Updated last year
- User handbook for mist-v2☆27Dec 16, 2023Updated 2 years ago
- Official codes for "Understanding Deep Gradient Leakage via Inversion Influence Functions", NeurIPS 2023☆15Oct 13, 2023Updated 2 years ago
- PyTorch implementation of “Purified and Unified Steganographic Networks” (CVPR 2024)☆42Jul 14, 2024Updated last year
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆35Apr 5, 2025Updated 11 months ago
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆43May 18, 2025Updated 9 months ago
- Diffusion Probabilistic Model in Jax☆12Apr 20, 2024Updated last year
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆34May 23, 2024Updated last year
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆38Aug 6, 2024Updated last year
- GI-PIP: Do We Require Impractical Auxiliary Dataset for Gradient Inversion Attacks? (ICASSP 2024)☆16Apr 18, 2025Updated 10 months ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- Official Implementation of ICCV 2025 paper "ForgeLens: Data-Efficient Forgery Focus for Generalizable Forgery Image Detection"☆30Nov 9, 2025Updated 3 months ago
- [TIP 2024] PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition☆14Nov 30, 2023Updated 2 years ago
- [KDD 2023] Real-time Large-scale Urban Traffic Simulator. Simulate 1,000,000 vehicles in 100,000 intersections in 1:1 time ratio!☆50May 30, 2025Updated 9 months ago
- Official implement of MoA-VR: A Mixture-of-Agents System Towards All-in-One Video Restoration☆22Nov 20, 2025Updated 3 months ago
- Source code of the paper "The NeRF Signature: Codebook-Aided Watermarking for Neural Radiance Fields".☆17Mar 3, 2025Updated last year
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- Research and experimental code related to Opacus, an open-source library for training PyTorch models with Differential Privacy☆18Oct 9, 2024Updated last year
- [NeurIPS 2024] "Membership Inference on Text-to-image Diffusion Models via Conditional Likelihood Discrepancy"☆12Sep 15, 2025Updated 5 months ago
- Auto1111 port of NVlab's adversarial purification method that uses the forward and reverse processes of diffusion models to remove advers…☆13Aug 8, 2023Updated 2 years ago
- ☆11May 12, 2017Updated 8 years ago
- A platform to develop CTM-motivated AI architecture.☆15Feb 24, 2026Updated last week
- ☆11Jul 12, 2022Updated 3 years ago
- Official codes of Boosting Spike Camera Image Reconstruction from a Perspective of Dealing with Spike Fluctuations- CVPR 2024☆10Jul 31, 2024Updated last year
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆58Sep 2, 2024Updated last year
- End-to-end codebase for finetuning LLMs (LLaMA 2, 3, etc.) with or without DP☆16Sep 23, 2024Updated last year
- ☆17Jul 18, 2024Updated last year
- [NeurIPS 2023] Official PyTorch implementation for the paper "CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganog…☆11Sep 28, 2023Updated 2 years ago
- Code repo for the UAI 2023 paper "Learning To Invert: Simple Adaptive Attacks for Gradient Inversion in Federated Learning".☆16Jun 15, 2024Updated last year
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆13Jun 20, 2023Updated 2 years ago
- Watermark you artworks to stay away from unauthorized diffusion style mimicry!☆357May 30, 2025Updated 9 months ago
- [ICLR 2025] An Undetectable Watermark for Generative Image Models☆70Mar 6, 2025Updated 11 months ago