QRICKDD / UDUPLinks
☆10Updated last year
Alternatives and similar repositories for UDUP
Users that are interested in UDUP are comparing it to the libraries listed below
Sorting:
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 2 years ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆18Updated last year
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22Updated 3 years ago
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆32Updated 2 months ago
- ☆23Updated 9 months ago
- ☆27Updated 10 months ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆21Updated 11 months ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆36Updated 2 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆22Updated last year
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆44Updated 10 months ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆69Updated 3 months ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆18Updated last year
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Updated 2 years ago
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆17Updated 4 years ago
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆32Updated 10 months ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆32Updated last year
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆14Updated last year
- ☆41Updated 3 years ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆35Updated 2 months ago
- An unofficial implementation of the paper《Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective》☆22Updated 2 years ago
- ☆31Updated last year
- ☆35Updated last year
- Author implementation of Exploring Adversarial Fake Images on Face Manifold (CVPR 2021 oral)☆32Updated 2 years ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆26Updated 7 months ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Updated 2 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆91Updated last month
- ☆61Updated 3 years ago
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Updated 2 years ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆26Updated 10 months ago
- ☆32Updated 2 months ago