Pytorch implementation for the pilot study on the robustness of latent diffusion models.
☆12Jun 20, 2023Updated 2 years ago
Alternatives and similar repositories for LDM-Robustness
Users that are interested in LDM-Robustness are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Oct 12, 2024Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆28Jul 18, 2023Updated 2 years ago
- ☆14Dec 31, 2024Updated last year
- Code for a research paper "Part-Based Models Improve Adversarial Robustness" (ICLR 2023)☆21Sep 16, 2023Updated 2 years ago
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆35Mar 29, 2023Updated 2 years ago
- Please go to https://github.com/facebookresearch/stable_signature☆13Jul 26, 2023Updated 2 years ago
- ☆27Aug 7, 2024Updated last year
- ☆19Mar 19, 2023Updated 3 years ago
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆44May 18, 2025Updated 10 months ago
- ☆23Apr 10, 2023Updated 2 years ago
- ☆49Jun 19, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆31Jun 12, 2025Updated 9 months ago
- ☆20Sep 13, 2021Updated 4 years ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆17Feb 16, 2025Updated last year
- ☆21Nov 19, 2021Updated 4 years ago
- Code repository for CVPR2024 paper 《Pre-trained Model Guided Fine-Tuning for Zero-Shot Adversarial Robustness》☆25May 29, 2024Updated last year
- Official implement of paper: Stable Diffusion is Unstable☆22May 21, 2024Updated last year
- Anti-DreamBooth: Protecting users from personalized text-to-image synthesis (ICCV 2023)☆268Updated this week
- Retrieval-augmented Image Captioning☆13Feb 16, 2023Updated 3 years ago
- ☆11Sep 5, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆28May 28, 2023Updated 2 years ago
- [TMLR 2025] On Memorization in Diffusion Models☆30Oct 5, 2023Updated 2 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- PDM-based Purifier☆22Nov 5, 2024Updated last year
- ☆19Oct 10, 2024Updated last year
- GPU accelerated Perlin Noise in python☆11Oct 23, 2020Updated 5 years ago
- ☆10Dec 10, 2024Updated last year
- [CVPR 2025] Implementation of "Forensics-Bench: A Comprehensive Forgery Detection Benchmark Suite for Large Vision Language Models"☆37Apr 28, 2025Updated 10 months ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆27Aug 27, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Safe-CLIP: Removing NSFW Concepts from Vision-and-Language Models. ECCV 2024☆67Aug 10, 2024Updated last year
- Unofficial Implementation of Latent Diffusion Models for Layout-to-image Generation☆12Nov 10, 2022Updated 3 years ago
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Mar 3, 2026Updated 3 weeks ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆29Feb 1, 2022Updated 4 years ago
- ☆45Dec 13, 2023Updated 2 years ago
- ECCV2024: Adversarial Prompt Tuning for Vision-Language Models☆31Mar 7, 2026Updated 2 weeks ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆96Dec 20, 2025Updated 3 months ago