Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)
☆16Mar 25, 2024Updated 2 years ago
Alternatives and similar repositories for Revelio
Users that are interested in Revelio are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Aug 7, 2024Updated last year
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆18Jan 17, 2025Updated last year
- PDM-based Purifier☆22Nov 5, 2024Updated last year
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆31Nov 19, 2024Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆63Apr 7, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆14Nov 19, 2024Updated last year
- PyTorch implementation of “Purified and Unified Steganographic Networks” (CVPR 2024)☆43Jul 14, 2024Updated last year
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- ☆33Nov 4, 2023Updated 2 years ago
- ☆22Oct 4, 2021Updated 4 years ago
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- [KDD 2023] Real-time Large-scale Urban Traffic Simulator. Simulate 1,000,000 vehicles in 100,000 intersections in 1:1 time ratio!☆52May 30, 2025Updated 11 months ago
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆34Apr 5, 2025Updated last year
- ☆12Mar 3, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆119Oct 31, 2023Updated 2 years ago
- ☆11Jan 17, 2021Updated 5 years ago
- Pulsar: Secure Steganography for Diffusion Models☆16Oct 15, 2024Updated last year
- Official code for "IRWArt: Levering Watermarking Performance for Protecting High-quality Artwork Images" (thewebconf 2023)☆12May 23, 2023Updated 2 years ago
- A platform to develop CTM-motivated AI architecture.☆17Apr 23, 2026Updated last week
- Code for ECMLPKDD'23 "FDTI: Fine-grained Deep Traffic Inference with Roadnet-enriched Graph"☆12Jul 24, 2023Updated 2 years ago
- Central limit theorem in Lean☆16Mar 4, 2026Updated 2 months ago
- Improving the Speed and Quality of GAN by Adversarial Training☆11Jan 6, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- [NeurIPS 2024] "Membership Inference on Text-to-image Diffusion Models via Conditional Likelihood Discrepancy"☆12Sep 15, 2025Updated 7 months ago
- Diffusion Probabilistic Model in Jax☆13Apr 20, 2024Updated 2 years ago
- Public code release for the paper "ProCreate, Don’t Reproduce! Propulsive Energy Diffusion for Creative Generation"☆41Nov 30, 2025Updated 5 months ago
- PyTorch implementation of 'Cover-separable Fixed Neural Network Steganography via Deep Generative Models' (ACM MM 2024)☆23Nov 17, 2024Updated last year
- [SatML 2024] Shake to Leak: Fine-tuning Diffusion Models Can Amplify the Generative Privacy Risk☆15Mar 15, 2025Updated last year
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆58Sep 2, 2024Updated last year
- Watermark you artworks to stay away from unauthorized diffusion style mimicry!☆360May 30, 2025Updated 11 months ago
- (CVPR 2024) "Unsegment Anything by Simulating Deformation"☆29May 27, 2024Updated last year
- My graduation project.☆13Oct 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- unformal implementation of advdiffuser☆17Feb 4, 2024Updated 2 years ago
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆35May 23, 2024Updated last year
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆45May 18, 2025Updated 11 months ago
- Faster R-CNN paper review and code implementation from chenyuntc☆13Apr 16, 2021Updated 5 years ago
- [ICCV 2023] Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting☆15Nov 30, 2023Updated 2 years ago
- This is a python simulation of a MIMO communication system, including M-QAM modulation and demodulation.☆24Jun 17, 2023Updated 2 years ago
- FedAvg, FedGKT, FedProx, Gradient Inversion Attack☆16Feb 17, 2023Updated 3 years ago