ndb796 / CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorchLinks
CelebA HQ Face Identity and Attributes Recognition using PyTorch
☆40Updated last year
Alternatives and similar repositories for CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch
Users that are interested in CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch are comparing it to the libraries listed below
Sorting:
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆21Updated last year
- ☆58Updated 2 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆92Updated this week
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- ☆28Updated last year
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆29Updated 3 years ago
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Updated 2 years ago
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆311Updated 2 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆36Updated last year
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆22Updated last year
- [NeurIPS 2024 D&B Track] UnlearnCanvas: A Stylized Image Dataset to Benchmark Machine Unlearning for Diffusion Models by Yihua Zhang, Cho…☆75Updated 10 months ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Updated last year
- ☆22Updated 3 years ago
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆26Updated 3 months ago
- ☆21Updated last year
- ☆62Updated 4 years ago
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆56Updated last year
- ☆91Updated 4 years ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆29Updated 10 months ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆110Updated last year
- ☆41Updated 3 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Updated 5 years ago
- Code of the paper: A Recipe for Watermarking Diffusion Models☆151Updated 10 months ago
- This code is the official implementation of WEvade.☆41Updated last year
- [ICCV 2023] Source code for our paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".☆63Updated last year
- Code Repo for the NeurIPS 2023 paper "VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models"☆25Updated 4 months ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆25Updated 5 years ago
- The MCG black-box attack framework published in TPAMI 2022☆36Updated 2 years ago
- Official repo for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization☆15Updated last year
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 2 years ago