iliaishacked / markpaintingLinks
☆22Updated 4 years ago
Alternatives and similar repositories for markpainting
Users that are interested in markpainting are comparing it to the libraries listed below
Sorting:
- ☆21Updated 3 years ago
- ☆24Updated 6 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Updated 2 years ago
- ☆23Updated 2 years ago
- Official Implementation for PlugIn Inversion☆16Updated 4 years ago
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Updated last year
- Image-Scaling Attacks and Defenses☆185Updated 2 years ago
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆18Updated 4 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Updated 4 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 3 years ago
- ☆22Updated 4 years ago
- This technique modifies image data so that any model trained on it will bear an identifiable mark.☆44Updated 4 years ago
- This code is the official implementation of WEvade.☆40Updated last year
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆15Updated 3 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 5 years ago
- Source Code for the JAIR Paper "Does CLIP Know my Face?" (Demo: https://huggingface.co/spaces/AIML-TUDA/does-clip-know-my-face)☆16Updated last year
- ☆13Updated 4 years ago
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Updated 4 years ago
- Forget-Me-Not: Learning to Forget in Text-to-Image Diffusion Models, 2023☆135Updated 3 months ago
- ☆30Updated 3 years ago
- Code for Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks (NeurIPS 2022)☆10Updated 2 years ago
- ☆25Updated 3 years ago
- InstaHide: Instance-hiding Schemes for Private Distributed Learning☆50Updated 5 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆95Updated 4 months ago
- Code release for DeepJudge (S&P'22)☆52Updated 2 years ago
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Updated 3 years ago
- [SatML 2024] Shake to Leak: Fine-tuning Diffusion Models Can Amplify the Generative Privacy Risk☆16Updated 10 months ago
- Code for "JPEG-resistant Adversarial Images"☆43Updated 7 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 6 years ago