OPTML-Group / AdvUnlearn
Official implementation of NeurIPS'24 paper "Defensive Unlearning with Adversarial Training for Robust Concept Erasure in Diffusion Models". This work adversarially unlearns the text encoder to enhance the robustness of unlearned DMs against adversarial prompt attacks and achieves a better balance between unlearning performance and image generat…
☆37Updated 3 months ago
Alternatives and similar repositories for AdvUnlearn:
Users that are interested in AdvUnlearn are comparing it to the libraries listed below
- The official implementation of ECCV'24 paper "To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Uns…☆69Updated 3 months ago
- [NeurIPS 2024 D&B Track] UnlearnCanvas: A Stylized Image Dataset to Benchmark Machine Unlearning for Diffusion Models by Yihua Zhang, Cho…☆63Updated 3 months ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆20Updated 2 months ago
- ☆25Updated last month
- ☆29Updated 7 months ago
- ☆58Updated 4 months ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆56Updated last month
- ☆25Updated 6 months ago
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆41Updated 10 months ago
- List of T2I safety papers, updated daily, welcome to discuss using Discussions☆57Updated 6 months ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆27Updated 6 months ago
- This is a collection of awesome papers I have read (carefully or roughly) in the fields of security in diffusion models. Any suggestions …☆24Updated 3 months ago
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆18Updated 10 months ago
- The official implementation of the paper "Towards Safe Self-Distillation of Internet-Scale Text-to-Image Diffusion Models" (ICML 2023 Wor…☆22Updated 10 months ago
- ☆23Updated 2 months ago
- ☆11Updated 8 months ago
- ☆13Updated 7 months ago
- ☆17Updated last year
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆14Updated 10 months ago
- ☆57Updated 2 years ago
- ☆20Updated 5 months ago
- ☆12Updated 2 months ago
- ☆40Updated last year
- [ICML 2024] Prompting4Debugging: Red-Teaming Text-to-Image Diffusion Models by Finding Problematic Prompts (Official Pytorch Implementati…☆40Updated 2 months ago
- Official repo for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization☆12Updated 11 months ago
- ☆26Updated 8 months ago
- [CVPR 2024] official code for SimAC☆16Updated 3 weeks ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆26Updated 5 months ago
- Code of the paper: Finetuning Text-to-Image Diffusion Models for Fairness☆41Updated 9 months ago
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆16Updated 3 months ago