Official repo for [CVPR2025 Oral] Black-Box Forgery Attacks on Semantic Watermarks for Diffusion Models
☆34Nov 19, 2025Updated 4 months ago
Alternatives and similar repositories for semantic-forgery
Users that are interested in semantic-forgery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ICLR 2025] Image watermarks are removable using controllable regeneration from clean noise☆28Feb 17, 2025Updated last year
- This code is the official implementation of WEvade.☆41Mar 12, 2024Updated 2 years ago
- This repository provides a comprehensive benchmark for evaluating the performance of neural watermarking techniques. The benchmark includ …☆26Jan 9, 2026Updated 3 months ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆58Sep 2, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for our paper "Benchmarking the Robustness of Image Watermarks"☆100Sep 15, 2024Updated last year
- Official Implementation for: "RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images (Videos) with Provable Gu…☆37Oct 30, 2024Updated last year
- source code for "ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization"☆40Mar 9, 2025Updated last year
- [ICLR 2025] Official implementation of 'Hidden in the Noise: Two-Stage Robust Watermarking for Images'☆13May 5, 2025Updated 11 months ago
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆30Jun 12, 2025Updated 10 months ago
- Attack-Resilient Image Watermarking Using Stable Diffusion (NeurIPS2024)☆59Dec 5, 2024Updated last year
- A curated list of watermarking schemes for generative AI models☆133Mar 30, 2026Updated 2 weeks ago
- Code for the paper "Watermarking Makes Language Models Radioactive"☆22Oct 25, 2024Updated last year
- Code of the paper: A Recipe for Watermarking Diffusion Models☆152Nov 13, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- code repository for Practical Deep Dispersed Watermarking with Synchronization☆71Nov 5, 2023Updated 2 years ago
- [NeurIPS 2025] The official implementation of "T2SMark: Balancing Robustness and Diversity in Noise-as-Watermark for Diffusion Models"☆46Nov 2, 2025Updated 5 months ago
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆23Oct 30, 2023Updated 2 years ago
- 虚假新闻检测 (fake news detection) 包含多种模型 :bilstm,bert,MultiBayes,svm,bernoullinb。加入多模型voting。南开大学22届python虚假新闻检测大作业☆18Aug 28, 2024Updated last year
- ☆22Apr 23, 2024Updated last year
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆38Aug 6, 2024Updated last year
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆14Nov 19, 2024Updated last year
- ☆20May 6, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆50Jun 19, 2024Updated last year
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆24Jan 9, 2025Updated last year
- ☆12Mar 5, 2024Updated 2 years ago
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆18Jan 17, 2025Updated last year
- ☆352Mar 21, 2024Updated 2 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 3 years ago
- Official implementation of the paper "The Stable Signature Rooting Watermarks in Latent Diffusion Models"☆506Dec 16, 2025Updated 3 months ago
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated last year
- Implementation of "Machine Learning Classification over Encrypted Data" by Raphael Bost, Raluca Ada Popa, Stephen Tu and Shafi Goldwasser☆38Oct 12, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [NeurIPS 2024] Invisible Image Watermarks Are Provably Removable Using Generative AI☆256Jan 24, 2025Updated last year
- ☆20Feb 17, 2020Updated 6 years ago
- WOUAF: Weight Modulation for User Attribution and Fingerprinting in Text-to-Image Diffusion Models (CVPR 2024)☆26Jun 14, 2024Updated last year
- [BMVC 2022] Official repository for "How to Train Vision Transformer on Small-scale Datasets?"☆170Nov 4, 2023Updated 2 years ago
- RoSteALS: Robust Steganography using Autoencoder Latent Space☆107Nov 30, 2023Updated 2 years ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆96Dec 20, 2025Updated 3 months ago
- The PackNet Continual Learning Method in Pytorch☆15Aug 19, 2021Updated 4 years ago