[ECCV'24] T2IShield: Defending Against Backdoors on Text-to-Image Diffusion Models
☆17Dec 21, 2025Updated 2 months ago
Alternatives and similar repositories for T2IShield
Users that are interested in T2IShield are comparing it to the libraries listed below
Sorting:
- [MM '24] EvilEdit: Backdooring Text-to-Image Diffusion Models in One Second☆28Nov 19, 2024Updated last year
- Code Repo for the NeurIPS 2023 paper "VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models"☆27Sep 18, 2025Updated 5 months ago
- [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆25Aug 1, 2025Updated 7 months ago
- [ICCV 2023] Source code for our paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".☆65Nov 20, 2023Updated 2 years ago
- ☆13Updated this week
- An interactive attention visualization and intervention tool for LLM Decode Stage.☆48Jan 6, 2026Updated 2 months ago
- ☆16Feb 23, 2025Updated last year
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆96Sep 17, 2025Updated 5 months ago
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆58Sep 2, 2024Updated last year
- [ICLR 2025] Official PyTorch Implementation for CPE: Concept Pinpoint Eraser for Text-to-image Diffusion Models via Residual Attention Ga…☆12Apr 7, 2025Updated 11 months ago
- ☆38Jan 15, 2025Updated last year
- ☆11Aug 20, 2023Updated 2 years ago
- 中国矿业大学本科毕业论文word模板2023版☆12Mar 29, 2023Updated 2 years ago
- ☆10Dec 18, 2024Updated last year
- ICML2025: One Image is Worth a Thousand Words: A Usability Preservable Text-Image Collaborative Erasing Framework☆14Jun 24, 2025Updated 8 months ago
- EraseDiff: Erasing Data Influence in Diffusion Models☆14Nov 20, 2024Updated last year
- ☆13Apr 11, 2024Updated last year
- Python codes for mathematical modeling.☆12Sep 5, 2021Updated 4 years ago
- ☆12Oct 17, 2024Updated last year
- A curated list of papers and resources for panoramic 3D reconstructions, including Nerf and 3DGS.☆14Dec 24, 2024Updated last year
- A large-scale dataset composed of high-quality synthetic images aimed at evaluating social biases in LVLMs☆13Oct 6, 2025Updated 5 months ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- ☆13Apr 3, 2024Updated last year
- ☆10Sep 30, 2024Updated last year
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- About Unofficial implementation of "High-Resolution Image Harmonization via Collaborative Dual Transformations (CVPR 2022)" in PyTorch☆10Oct 27, 2022Updated 3 years ago
- Code for the paper "Code-Mixing on Sesame Street: Dawn of the Adversarial Polyglots" (NAACL-HLT 2021)☆10May 1, 2025Updated 10 months ago
- Evaluating Durability: Benchmark Insights into Multimodal Watermarking☆12Jun 7, 2024Updated last year
- [ICML 2024] "Improving Accuracy-robustness Trade-off via Pixel Reweighted Adversarial Training"☆17Jun 4, 2024Updated last year
- A peer-to-peer communication system. BIT 小学期软件开发实训。☆11Sep 7, 2018Updated 7 years ago
- [NeurIPS 2024] Fight Back Against Jailbreaking via Prompt Adversarial Tuning☆11Oct 29, 2024Updated last year
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- [CVPR 2025] Six-CD: Benchmarking Concept Removals for Benign Text-to-image Diffusion Models☆16Jan 8, 2026Updated 2 months ago
- ☆13Feb 18, 2023Updated 3 years ago
- Official code for the paper "FairerCLIP: Debiasing CLIP’s Zero-Shot Predictions using Functions in RKHSs".☆16Oct 14, 2025Updated 4 months ago
- 北京理工大学2019级人工智能专业课程作业分享☆17Apr 7, 2023Updated 2 years ago
- ☆12Sep 7, 2022Updated 3 years ago
- Instance-level Facial Attributes Editing (CVIU 2021)☆15Jul 19, 2022Updated 3 years ago
- [NeurIPS 2023] Official PyTorch implementation for the paper "CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganog…☆11Sep 28, 2023Updated 2 years ago