Shawn-Shan / nightshade-release
Research code release for the Nightshade project from University of Chicago
☆17Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for nightshade-release
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆12Updated 7 months ago
- ☆21Updated last year
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆22Updated 2 months ago
- ☆17Updated 2 years ago
- ☆15Updated 6 months ago
- This is an official repository for Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study (ICCV2023…☆20Updated last year
- [CVPR 2024] official code for SimAC☆15Updated 2 months ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆31Updated 7 months ago
- ☆19Updated 3 months ago
- ☆46Updated last year
- ☆13Updated 6 months ago
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆30Updated 2 months ago
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆22Updated 5 months ago
- ☆24Updated last month
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆82Updated 2 months ago
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆18Updated 11 months ago
- Robust natural language watermarking using invariant features☆25Updated last year
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆17Updated 7 months ago
- Github repo for One-shot Neural Backdoor Erasing via Adversarial Weight Masking (NeurIPS 2022)☆14Updated last year
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆11Updated last year
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆22Updated 2 months ago
- ☆15Updated 4 months ago
- ☆12Updated 3 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆23Updated 8 months ago
- This code is the official implementation of WEvade.☆37Updated 8 months ago
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆41Updated 2 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆28Updated 4 months ago
- Official implementation of NeurIPS'24 paper "Defensive Unlearning with Adversarial Training for Robust Concept Erasure in Diffusion Model…☆25Updated last week
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆15Updated 2 months ago
- ☆16Updated 2 months ago