What do we learn from inverting CLIP models?
☆58Mar 6, 2024Updated 2 years ago
Alternatives and similar repositories for CLIPInversion
Users that are interested in CLIPInversion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple and efficient baseline for data attribution☆11Nov 10, 2023Updated 2 years ago
- Official repo for Detecting, Explaining, and Mitigating Memorization in Diffusion Models (ICLR 2024)☆78Apr 3, 2024Updated last year
- Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion☆11Apr 1, 2024Updated last year
- Gemstones: A Model Suite for Multi-Faceted Scaling Laws (NeurIPS 2025)☆33Sep 28, 2025Updated 5 months ago
- Official implementation of GOAT model (ICML2023)☆38Jul 3, 2023Updated 2 years ago
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Sep 9, 2024Updated last year
- Code to reproduce "Transformers Can Do Arithmetic with the Right Embeddings", McLeish et al (NeurIPS 2024)☆200May 28, 2024Updated last year
- Official Pytorch repo of CVPR'23 and NeurIPS'23 papers on understanding replication in diffusion models.☆113Nov 22, 2023Updated 2 years ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆70Feb 22, 2024Updated 2 years ago
- The Official Repository for "Bring Your Own Data! Self-Supervised Evaluation for Large Language Models"☆107Sep 23, 2023Updated 2 years ago
- ☆193Oct 12, 2023Updated 2 years ago
- ☆12Oct 20, 2023Updated 2 years ago
- The official repository of the paper "On the Exploitability of Instruction Tuning".☆70Feb 5, 2024Updated 2 years ago
- The official code for the publication: "The Close Relationship Between Contrastive Learning and Meta-Learning".☆18Sep 19, 2022Updated 3 years ago
- Official Code for "Baseline Defenses for Adversarial Attacks Against Aligned Language Models"☆31Oct 26, 2023Updated 2 years ago
- ☆24Jan 27, 2022Updated 4 years ago
- [ICML 2024] Binoculars: Zero-Shot Detection of LLM-Generated Text☆362May 14, 2024Updated last year
- A fusion of a linear layer and a cross entropy loss, written for pytorch in triton.☆75Aug 2, 2024Updated last year
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆14Mar 22, 2025Updated last year
- ☆16Jul 17, 2022Updated 3 years ago
- Parallel framework for training and fine-tuning deep neural networks☆72Nov 10, 2025Updated 4 months ago
- Code for the paper "Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks"☆39Jun 20, 2024Updated last year
- Official repository of NEFTune: Noisy Embeddings Improves Instruction Finetuning☆412May 17, 2024Updated last year
- ☆31Feb 26, 2026Updated 3 weeks ago
- Official implementation of the RegMixup paper☆22Nov 30, 2022Updated 3 years ago
- ☆211Nov 2, 2023Updated 2 years ago
- ☆646Aug 4, 2023Updated 2 years ago
- Algorithms for approximate attention in LLMs☆21Apr 14, 2025Updated 11 months ago
- ☆12Feb 11, 2026Updated last month
- Code for NeurIPS'23 paper "A Bayesian Approach To Analysing Training Data Attribution In Deep Learning"☆17Jan 12, 2024Updated 2 years ago
- Pytorch Datasets for Easy-To-Hard☆29Jan 9, 2025Updated last year
- [MICCAI 2024] Official code for the paper "MedContext: Learning Contextual Cues for Efficient Volumetric Medical Segmentation"☆14Nov 1, 2024Updated last year
- ☆26Dec 14, 2021Updated 4 years ago
- [ICLR 2025] BlueSuffix: Reinforced Blue Teaming for Vision-Language Models Against Jailbreak Attacks☆31Nov 2, 2025Updated 4 months ago
- ☆69Feb 17, 2024Updated 2 years ago
- ☆21Feb 10, 2025Updated last year
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆38Oct 17, 2024Updated last year
- Debiasing Through Data Attribution☆12May 23, 2024Updated last year
- ☆348Mar 21, 2024Updated 2 years ago