[ECCV2024] Immunizing text-to-image Models against Malicious Adaptation
☆17Jan 17, 2025Updated last year
Alternatives and similar repositories for IMMA
Users that are interested in IMMA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)☆16Mar 25, 2024Updated 2 years ago
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆13Nov 19, 2024Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆61Apr 7, 2024Updated last year
- ☆12Mar 5, 2024Updated 2 years ago
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated last year
- PDM-based Purifier☆22Nov 5, 2024Updated last year
- Android native mediacodec decode/encode demo☆14Dec 16, 2021Updated 4 years ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆27Nov 19, 2024Updated last year
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- ☆11Jan 17, 2021Updated 5 years ago
- Removing Adversarial Noise in Class Activation Feature Space☆14Oct 12, 2023Updated 2 years ago
- ☆19Feb 25, 2024Updated 2 years ago
- ☆27Aug 7, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Extreme Image Compression Using Deep Learning☆16Nov 21, 2022Updated 3 years ago
- ☆27Jun 5, 2024Updated last year
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆44May 18, 2025Updated 10 months ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆95Sep 17, 2025Updated 6 months ago
- Diffusion Probabilistic Model in Jax☆13Apr 20, 2024Updated last year
- [MICCAI 2025] Hierarchical Self-Supervised Adversarial Training for Robust Vision Models in Histopathology☆12Jun 17, 2025Updated 9 months ago
- Official repo for [CVPR2025 Oral] Black-Box Forgery Attacks on Semantic Watermarks for Diffusion Models☆34Nov 19, 2025Updated 4 months ago
- ☆23Aug 24, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [SatML 2024] Shake to Leak: Fine-tuning Diffusion Models Can Amplify the Generative Privacy Risk☆15Mar 15, 2025Updated last year
- graphs from Draw.io☆14Sep 26, 2024Updated last year
- ☆34Jan 4, 2023Updated 3 years ago
- ☆49Jun 19, 2024Updated last year
- A method to generate counterfactuals☆12Feb 24, 2026Updated last month
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆35May 23, 2024Updated last year
- Official repository of "A Hitchhiker's Guide to Fine-Grained Face Forgery Detection Using Common Sense Reasoning" published in NeurIPS'20…☆10Feb 7, 2025Updated last year
- [Findings of ACL 2023] Bridge the Gap Between CV and NLP! A Optimization-based Textual Adversarial Attack Framework.☆14Aug 27, 2023Updated 2 years ago
- [CVPR 2025] An Implementation of the paper "Pre-Instruction Data Selection for Visual Instruction Tuning"☆17Jun 9, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Oct 29, 2024Updated last year
- ☆15Mar 22, 2023Updated 3 years ago
- 主要收集一些 面试教程、算法、设计模式、架构、手册..... 的教程向项目及博客。(大白话:面试八股文收集)☆17Dec 27, 2024Updated last year
- An efficient adversarial defense method with strong insights which won the fifth place of the IJCAI-2019 Alibaba Adversarial AI Challen…☆12Oct 25, 2019Updated 6 years ago
- [EMNLP'22] Textual Manifold-based Defense Against Natural Language Adversarial Examples☆11Apr 6, 2023Updated 2 years ago
- This repository is the code for ARN in CVPR 2018 workshop☆24Mar 9, 2020Updated 6 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆15Feb 16, 2022Updated 4 years ago