cure-lab / MMA-Diffusion
[CVPR2024] MMA-Diffusion: MultiModal Attack on Diffusion Models
☆142Updated 10 months ago
Alternatives and similar repositories for MMA-Diffusion:
Users that are interested in MMA-Diffusion are comparing it to the libraries listed below
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆91Updated 4 months ago
- Improved techniques for optimization-based jailbreaking on large language models (ICLR2025)☆73Updated 2 weeks ago
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆32Updated 9 months ago
- Inference pipeline for some Text-to-Image metrics.☆38Updated 9 months ago
- YiJian-Comunity: a full-process automated large model safety evaluation tool designed for academic research☆106Updated 4 months ago
- [MM24 Oral] Identity-Driven Multimedia Forgery Detection via Reference Assistance☆97Updated 6 months ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack☆23Updated 3 months ago
- [ECCV 2024] Tuning-Free Image Customization with Image and Text Guidance☆83Updated 2 weeks ago
- A comprehensive collection of resources focused on addressing and understanding hallucination phenomena in MLLMs.☆35Updated 9 months ago
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆32Updated 8 months ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆56Updated last month
- The official implementation of ECCV'24 paper "To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Uns…☆69Updated 3 months ago
- [ICML22] "Revisiting and Advancing Fast Adversarial Training through the Lens of Bi-level Optimization" by Yihua Zhang*, Guanhua Zhang*, …☆65Updated 2 years ago
- Official repository for the next-generation deepfake detection dataset (DF40), comprising 40 distinct deepfake techniques, even the just …☆210Updated 3 months ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆18Updated 5 months ago
- This is a collection of awesome papers I have read (carefully or roughly) in the fields of security in diffusion models. Any suggestions …☆24Updated 3 months ago
- ☆53Updated last month
- ☆286Updated 7 months ago
- List of T2I safety papers, updated daily, welcome to discuss using Discussions☆57Updated 6 months ago
- [CVPR 2024] Focus on Your Instruction: Fine-grained and Multi-instruction Image Editing by Attention Modulation☆108Updated 10 months ago
- Quick scripts to calculate CLIP text-image similarity☆211Updated 2 months ago
- ☆24Updated 6 months ago
- ☆25Updated 6 months ago
- A Survey on Jailbreak Attacks and Defenses against Multimodal Generative Models☆121Updated last week
- CVPR 2022 Workshop Robust Classification☆78Updated 2 years ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆14Updated 10 months ago
- Official implementation of NeurIPS'24 paper "Defensive Unlearning with Adversarial Training for Robust Concept Erasure in Diffusion Model…☆37Updated 3 months ago
- Universal Adversarial Attack, Multimodal Adversarial Attacks, VLP models, Contrastive Learning, Cross-modal Perturbation Generator, Gener…☆13Updated 3 months ago
- ☆29Updated 7 months ago
- ☆26Updated 8 months ago