eupeutro / hltv-apiLinks
API build to extract data from HLTV.org
☆18Updated 2 months ago
Alternatives and similar repositories for hltv-api
Users that are interested in hltv-api are comparing it to the libraries listed below
Sorting:
- The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recogn…☆118Updated 2 years ago
- A curated list of watermarking schemes for generative AI models☆106Updated 2 months ago
- [NeurIPS 2024] "Membership Inference on Text-to-image Diffusion Models via Conditional Likelihood Discrepancy"☆11Updated 3 weeks ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆41Updated 10 months ago
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆114Updated last year
- 🛡 A curated list of adversarial attacks in PyTorch, with a focus on transferable black-box attacks.☆62Updated last month
- Global AI Safety and Governance: Never Compromise to Vulnerabilities☆29Updated last week
- ☆40Updated 9 months ago
- BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆15Updated last month
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆146Updated 3 months ago
- ☆25Updated 2 years ago
- ☆16Updated 3 months ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆183Updated 5 months ago
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆269Updated 7 months ago
- Code for our paper "Benchmarking the Robustness of Image Watermarks"☆88Updated 11 months ago
- RedTeamCUA: Realistic Adversarial Testing of Computer-Use Agents in Hybrid Web-OS Environments☆22Updated 2 months ago
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆29Updated 3 weeks ago
- Awesome-Fudan: a code repository list of computer courses at Fudan University☆313Updated 2 months ago
- ☆19Updated 11 months ago
- A list of recent papers about adversarial learning☆204Updated last week
- This is the official implementation of ContraNet (NDSS2022).☆20Updated 2 years ago
- ☆20Updated last year
- ☆28Updated last year
- A repository of resources on machine unlearning for diffusion models☆39Updated 2 months ago
- Code Repo for the NeurIPS 2023 paper "VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models"☆25Updated 3 months ago
- [ICLR 2025] "Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances" (Official Implementation)☆356Updated 2 months ago
- A curated list of academic events on AI Security & Privacy☆160Updated last year
- ☆39Updated 10 months ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated last year
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆20Updated 5 months ago