☆59Nov 24, 2022Updated 3 years ago
Alternatives and similar repositories for TrojDiff
Users that are interested in TrojDiff are comparing it to the libraries listed below
Sorting:
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆96Sep 17, 2025Updated 5 months ago
- Code Repo for the NeurIPS 2023 paper "VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models"☆27Sep 18, 2025Updated 5 months ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- [ICCV 2023] Source code for our paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".☆65Nov 20, 2023Updated 2 years ago
- ☆15Apr 7, 2023Updated 2 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆37Apr 19, 2023Updated 2 years ago
- ☆13May 1, 2024Updated last year
- ☆14Oct 7, 2022Updated 3 years ago
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Jul 18, 2023Updated 2 years ago
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆35Jan 9, 2023Updated 3 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- ☆32Mar 4, 2022Updated 3 years ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆21Sep 29, 2022Updated 3 years ago
- ☆44Apr 25, 2023Updated 2 years ago
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆61Apr 7, 2024Updated last year
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Oct 1, 2022Updated 3 years ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Dec 24, 2023Updated 2 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆63May 8, 2023Updated 2 years ago
- A modern look at the relationship between sharpness and generalization [ICML 2023]☆43Sep 11, 2023Updated 2 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆28Nov 19, 2024Updated last year
- ☆28Jun 17, 2024Updated last year
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- ☆12May 27, 2022Updated 3 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Jan 7, 2022Updated 4 years ago
- this is for the ACM MM paper---Backdoor Attack on Crowd Counting☆17Jul 10, 2022Updated 3 years ago
- [NeurIPS 2024] Source code for our paper "Finding NeMo: Localizing Neurons Responsible For Memorization in Diffusion Models".☆13Jul 18, 2025Updated 7 months ago
- ☆28Aug 7, 2024Updated last year
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆12Jun 12, 2023Updated 2 years ago
- Hypernetworks for kohya's sd-scripts☆17May 29, 2023Updated 2 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆256Nov 23, 2025Updated 3 months ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆140Sep 11, 2025Updated 5 months ago
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆146Jul 31, 2023Updated 2 years ago
- ☆584Jul 4, 2025Updated 7 months ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆20Feb 20, 2026Updated last week
- ☆61Aug 9, 2023Updated 2 years ago
- (AAAI 2024) Transferable Adversarial Attacks for Object Detection using Object-Aware Significant Feature Distortion☆16Dec 13, 2023Updated 2 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago