liuyixin-louis / DiffShortcutView external linksLinks
Investigating and Defending Shortcut Learning in Personalized Diffusion Models
☆13Nov 19, 2024Updated last year
Alternatives and similar repositories for DiffShortcut
Users that are interested in DiffShortcut are comparing it to the libraries listed below
Sorting:
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆34May 23, 2024Updated last year
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)☆18Mar 31, 2025Updated 10 months ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆28Nov 19, 2024Updated last year
- ☆28Aug 7, 2024Updated last year
- ☆14Dec 31, 2024Updated last year
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆17Jan 17, 2025Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆59Apr 7, 2024Updated last year
- Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)☆16Mar 25, 2024Updated last year
- ☆48Jun 19, 2024Updated last year
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- Official implementation of "Prompt-Agnostic Adversarial Perturbation for Customized Diffusion Models"☆25May 30, 2025Updated 8 months ago
- PDM-based Purifier☆22Nov 5, 2024Updated last year
- Diffusion Probabilistic Model in Jax☆11Apr 20, 2024Updated last year
- 基于检索增强生成(RAG)技术的ICD-10医疗诊断内容标准化工具,支持中文医学术语的智能匹配和标准化。☆17Aug 12, 2025Updated 6 months ago
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- Code repository of the paper "Alleviating Adversarial Attacks on Variational Autoencoders with MCMC" published at NeurIPS 2022. https://a…☆10Dec 14, 2022Updated 3 years ago
- Python code for "Conditional VAEs for Confound Removal and Normative Modelling of Neurodegenerative Diseases"☆10Oct 3, 2022Updated 3 years ago
- Code for paper Almost-Orthogonal Layers for Efficient General-Purpose Lipschitz Networks☆12Aug 9, 2022Updated 3 years ago
- ☆11Apr 21, 2023Updated 2 years ago
- ☆15Mar 20, 2025Updated 10 months ago
- ☆10May 31, 2023Updated 2 years ago
- A tutorial on learned non-adversarial invariance in neural networks☆13Dec 8, 2019Updated 6 years ago
- Auto1111 port of NVlab's adversarial purification method that uses the forward and reverse processes of diffusion models to remove advers…☆13Aug 8, 2023Updated 2 years ago
- ☆13Feb 26, 2024Updated last year
- Infusion: Preventing Customized Text-to-Image Diffusion from Overfitting☆14Dec 19, 2025Updated last month
- Code for "General-Purpose Brain Foundation Models for Time-Series Neuroimaging Data"☆15Dec 14, 2024Updated last year
- Code for the WWW'23 paper "Sanitizing Sentence Embeddings (and Labels) for Local Differential Privacy"☆12Feb 20, 2023Updated 2 years ago
- ☆51Sep 5, 2024Updated last year
- Notebooks for managing NeurIPS 2014 and analysing the NeurIPS experiment.☆13May 22, 2024Updated last year
- Official Implementation of Paper "Learning to Jump: Thinning and Thickening Latent Counts for Generative Modeling" (ICML 2023)☆10Jun 6, 2023Updated 2 years ago
- UDP packet obfuscation with eBPF, which tunnels UDP over pseudo-TCP☆10Jun 5, 2023Updated 2 years ago
- Fourth edition of VNN COMP (2023)☆16Apr 12, 2023Updated 2 years ago
- Code for Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks (NeurIPS 2022)☆10Jul 20, 2023Updated 2 years ago
- ☆17Mar 14, 2024Updated last year
- Code for Auditing Data Provenance in Text-Generation Models (in KDD 2019)☆10Jun 18, 2019Updated 6 years ago
- ☆14Sep 1, 2025Updated 5 months ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year