ndb796 / CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorchLinks
CelebA HQ Face Identity and Attributes Recognition using PyTorch
☆41Updated 2 years ago
Alternatives and similar repositories for CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch
Users that are interested in CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch are comparing it to the libraries listed below
Sorting:
- ☆59Updated 3 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆94Updated 2 months ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆24Updated 2 years ago
- ☆62Updated 4 years ago
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Updated 2 years ago
- ☆28Updated last year
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆37Updated last year
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Updated 5 years ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Updated 2 years ago
- Code of the paper: A Recipe for Watermarking Diffusion Models☆154Updated last year
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Updated 2 years ago
- [ICCV 2023] Source code for our paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".☆65Updated 2 years ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆57Updated last year
- ☆36Updated last year
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆321Updated 2 years ago
- This code is the official implementation of WEvade.☆41Updated last year
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 3 years ago
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆34Updated 6 months ago
- ☆94Updated 4 years ago
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆30Updated 4 years ago
- ☆22Updated 2 years ago
- Code for our paper "Benchmarking the Robustness of Image Watermarks"☆94Updated last year
- ☆45Updated 3 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆25Updated 5 years ago
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆77Updated 2 years ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆112Updated 2 years ago
- ☆44Updated last year
- ☆21Updated last year