☆36Sep 6, 2025Updated 8 months ago
Alternatives and similar repositories for DiffProtect
Users that are interested in DiffProtect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆61Aug 17, 2024Updated last year
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 3 years ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆264Nov 23, 2025Updated 5 months ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆56Oct 14, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆41Feb 29, 2024Updated 2 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- This repository contains the code for the paper LDFA: Latent Diffusion Face Anonymization for Self-driving Applications☆16Apr 23, 2026Updated 3 weeks ago
- ☆63Aug 31, 2021Updated 4 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Nov 28, 2023Updated 2 years ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆119Oct 31, 2023Updated 2 years ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆27Feb 13, 2023Updated 3 years ago
- [CVPR23] "Towards Compositional Adversarial Robustness: Generalizing Adversarial Training to Composite Semantic Perturbations" by Lei Hsi…☆24Sep 17, 2025Updated 8 months ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- source code for "ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization"☆44Mar 9, 2025Updated last year
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Apr 16, 2023Updated 3 years ago
- ☆19Dec 5, 2025Updated 5 months ago
- [ICCV 2023 Oral] Official implementation of "Robust Evaluation of Diffusion-Based Adversarial Purification"☆25Dec 3, 2023Updated 2 years ago
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆340Jan 29, 2023Updated 3 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Face swap via diffusion models [Lora+IP-Adapter+Controlnet+text embedding optimization]☆58Apr 2, 2024Updated 2 years ago
- [CVPR 2025] Harnessing Frequency Spectrum Insights for Image Copyright Protection Against Diffusion Models☆12Sep 16, 2025Updated 8 months ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆105Jul 8, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22May 13, 2022Updated 4 years ago
- An official pytorch implementation of AAAI 2024 paper "Latent Space Editing in Transformer-based Flow Matching"☆51Apr 10, 2024Updated 2 years ago
- ☆15Dec 18, 2024Updated last year
- Official repository of the paper: IDiff-Face: Synthetic-based Face Recognition through Fizzy Identity-conditioned Diffusion Models (ICCV …☆95Apr 3, 2024Updated 2 years ago
- ☆16Mar 30, 2023Updated 3 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆31Nov 15, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆30Oct 24, 2021Updated 4 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆101Apr 30, 2021Updated 5 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- ☆47Apr 7, 2025Updated last year
- Official PyTorch implementation of our paper "Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World A…☆11Feb 8, 2023Updated 3 years ago
- Text-based real image editing with stable diffusion models☆27Dec 19, 2022Updated 3 years ago
- Total variation denoising for images.☆20Oct 4, 2018Updated 7 years ago