Official implement of paper: Stable Diffusion is Unstable
☆22May 21, 2024Updated last year
Alternatives and similar repositories for Stable_Diffusion_is_Unstable
Users that are interested in Stable_Diffusion_is_Unstable are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Sep 10, 2024Updated last year
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆96Dec 20, 2025Updated 3 months ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- List of diffusion related active submissions on OpenReview for ICLR 2025.☆57Oct 27, 2024Updated last year
- ☆26Nov 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆17Feb 16, 2025Updated last year
- BS-Mamba for Black-Soil Area Detection on the Qinghai-Tibetan Plateau☆11Apr 12, 2025Updated 11 months ago
- [CVPR2025] The implementation of the paper "OODD: Test-time Out-of-Distribution Detection with Dynamic Dictionary".☆18May 9, 2025Updated 10 months ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆27Aug 27, 2024Updated last year
- ☆28May 28, 2023Updated 2 years ago
- ☆13May 23, 2025Updated 10 months ago
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- ☆30Aug 21, 2025Updated 7 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The official implementation of ECCV'24 paper "To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Uns…☆87Feb 28, 2025Updated last year
- 3D-LMVIC: Learning-based Multi-View Image Coding with 3D Gaussian Geometric Priors☆12Jun 19, 2025Updated 9 months ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- [ACM MM '24 Poster] Official repository of paper titled "Towards Robustness Prompt Tuning with Fully Test-Time Adaptation for CLIP’s Zero…☆10Aug 6, 2024Updated last year
- [ICLR 2025] COME: Test-time Adaption by Conservatively Minimizing Entropy☆18Mar 5, 2025Updated last year
- ☆14Dec 31, 2024Updated last year
- ☆12Mar 25, 2024Updated 2 years ago
- Official code for SeMani (CVPR 2020 oral and Journal extension)☆24Dec 4, 2023Updated 2 years ago
- ☆12Jul 16, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆52May 24, 2023Updated 2 years ago
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- ☆10Jun 5, 2021Updated 4 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- 1.0☆13Jun 7, 2025Updated 9 months ago
- Code and Data for "Characterizing Multi-Domain False News on Weibo and the Underlying User Effects"☆18Aug 24, 2022Updated 3 years ago
- ☆15Jun 15, 2022Updated 3 years ago
- Repo for arXiv preprint "Gradient-based Adversarial Attacks against Text Transformers"☆109Dec 28, 2022Updated 3 years ago
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆43Sep 4, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆21Jan 5, 2026Updated 2 months ago
- ☆14May 8, 2024Updated last year
- 【2024 ECAI】First Creating Backgrounds Then Rendering Texts: A New Paradigm for Visual Text Blending☆14Jun 16, 2025Updated 9 months ago
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- ☆12Jun 1, 2024Updated last year
- TACL 2025: Investigating Adversarial Trigger Transfer in Large Language Models☆19Aug 17, 2025Updated 7 months ago
- Anti-DreamBooth: Protecting users from personalized text-to-image synthesis (ICCV 2023)☆267Sep 30, 2025Updated 5 months ago