lyufan / P2I-MILinks
[ECCV 2024] "Prediction Exposes Your Face: Black-box Model Inversion via Prediction Alignment"
☆15Updated 7 months ago
Alternatives and similar repositories for P2I-MI
Users that are interested in P2I-MI are comparing it to the libraries listed below
Sorting:
- [ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos☆12Updated last year
- Cross-Modal Transferable Adversarial Attacks from Images to Videos (CVPR 2022)☆20Updated last year
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆89Updated 2 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆54Updated last year
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41Updated 2 years ago
- AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks☆17Updated 5 months ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆58Updated last year
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆104Updated last year
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆24Updated last month
- ☆15Updated 3 years ago
- [ECCV-2024 oral] Source code for our paper "A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion At…☆23Updated last year
- ☆31Updated last month
- ☆13Updated 9 months ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆234Updated 11 months ago
- ☆40Updated 6 months ago
- The official code of "DRCT: Diffusion Reconstruction Contrastive Training towards Universe Detection of Diffusion Generated Images"☆153Updated 6 months ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆63Updated 2 years ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆181Updated 3 weeks ago
- A repository of resources on machine unlearning for diffusion models☆47Updated last week
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆31Updated last year
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆111Updated 3 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Updated 2 years ago
- Adversarial Examples Detection Benchmark☆15Updated 10 months ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆37Updated 2 years ago
- Official Pytorch implementation for our ACM MM 2023 paper: Moiré Backdoor Attack (MBA): A Novel Trigger for Pedestrian Detectors in the P…☆14Updated last year
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆43Updated 2 years ago
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆73Updated 2 years ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆73Updated 6 months ago
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆18Updated last year
- (2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition☆10Updated last week