jpzhang1810 / LDM-RobustnessView external linksLinks
Pytorch implementation for the pilot study on the robustness of latent diffusion models.
☆13Jun 20, 2023Updated 2 years ago
Alternatives and similar repositories for LDM-Robustness
Users that are interested in LDM-Robustness are comparing it to the libraries listed below
Sorting:
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Oct 12, 2024Updated last year
- Code for a research paper "Part-Based Models Improve Adversarial Robustness" (ICLR 2023)☆23Sep 16, 2023Updated 2 years ago
- ☆28Aug 7, 2024Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆28Jul 18, 2023Updated 2 years ago
- ☆14Dec 31, 2024Updated last year
- Code repository for CVPR2024 paper 《Pre-trained Model Guided Fine-Tuning for Zero-Shot Adversarial Robustness》☆25May 29, 2024Updated last year
- Please go to https://github.com/facebookresearch/stable_signature☆15Jul 26, 2023Updated 2 years ago
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆29Jun 12, 2025Updated 8 months ago
- ☆48Jun 19, 2024Updated last year
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- ☆20Mar 19, 2023Updated 2 years ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆18Feb 16, 2025Updated 11 months ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- ☆22Sep 13, 2021Updated 4 years ago
- ☆23Apr 10, 2023Updated 2 years ago
- [CVPR 2025] Implementation of "Forensics-Bench: A Comprehensive Forgery Detection Benchmark Suite for Large Vision Language Models"☆31Apr 28, 2025Updated 9 months ago
- PDM-based Purifier☆22Nov 5, 2024Updated last year
- Official implement of paper: Stable Diffusion is Unstable☆23May 21, 2024Updated last year
- ☆22Nov 19, 2021Updated 4 years ago
- [TMLR 2025] On Memorization in Diffusion Models☆30Oct 5, 2023Updated 2 years ago
- ☆28May 28, 2023Updated 2 years ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆34Oct 23, 2024Updated last year
- ECCV2024: Adversarial Prompt Tuning for Vision-Language Models☆30Nov 19, 2024Updated last year
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆115Jul 21, 2022Updated 3 years ago
- Safe-CLIP: Removing NSFW Concepts from Vision-and-Language Models. ECCV 2024☆67Aug 10, 2024Updated last year
- Implementation of the paper: "BRAVE : Broadening the visual encoding of vision-language models"☆25Feb 6, 2026Updated last week
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆26Aug 27, 2024Updated last year
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆71Sep 6, 2023Updated 2 years ago
- ☆80Jul 23, 2024Updated last year
- ☆35Dec 16, 2022Updated 3 years ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆90Dec 20, 2025Updated last month
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆43May 18, 2025Updated 8 months ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆35Mar 29, 2023Updated 2 years ago
- ☆46Dec 13, 2023Updated 2 years ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆30Feb 1, 2022Updated 4 years ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆38Apr 23, 2025Updated 9 months ago
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆34May 23, 2024Updated last year
- Anti-DreamBooth: Protecting users from personalized text-to-image synthesis (ICCV 2023)☆261Sep 30, 2025Updated 4 months ago