chiayi-hsu / Ring-A-Bell
☆14Updated 3 weeks ago
Related projects: ⓘ
- ☆13Updated 11 months ago
- The official implementation of ECCV'24 paper "To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Uns…☆43Updated last month
- ☆22Updated 2 months ago
- Code for the paper "Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models"☆21Updated 6 months ago
- Official implementation of "Defensive Unlearning with Adversarial Training for Robust Concept Erasure in Diffusion Models"☆17Updated last month
- ☆53Updated last year
- ☆14Updated 2 months ago
- [Arxiv 2024] Adversarial attacks on multimodal agents☆33Updated 2 months ago
- PDM-based Purifier☆13Updated 4 months ago
- Intriguing Properties of Data Attribution on Diffusion Models (ICLR 2024)☆22Updated 7 months ago
- [ICLR 2022 official code] Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness?☆26Updated 2 years ago
- ☆13Updated 3 months ago
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆17Updated 7 months ago
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆11Updated last year
- [ICLR 2024 Spotlight 🔥 ] - [ Best Paper Award SoCal NLP 2023 🏆] - Jailbreak in pieces: Compositional Adversarial Attacks on Multi-Modal…☆14Updated 3 months ago
- ☆53Updated 11 months ago
- On Memorization in Diffusion Models☆22Updated 11 months ago
- AnyDoor: Test-Time Backdoor Attacks on Multimodal Large Language Models☆39Updated 5 months ago
- ☆17Updated 3 months ago
- "Challenging Forgets: Unveiling the Worst-Case Forget Sets in Machine Unlearning" by Chongyu Fan*, Jiancheng Liu*, Alfred Hero, Sijia Liu☆14Updated 2 months ago
- Improved techniques for optimization-based jailbreaking on large language models☆33Updated 3 months ago
- ☆27Updated 2 years ago
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆29Updated 2 weeks ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆18Updated 2 months ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆16Updated last year
- ☆14Updated 4 months ago
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆24Updated last year
- ☆20Updated last year
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆77Updated last week
- [ECCV 2024] Official PyTorch Implementation of "How Many Unicorns Are in This Image? A Safety Evaluation Benchmark for Vision LLMs"☆61Updated 9 months ago