ndb796 / CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch
CelebA HQ Face Identity and Attributes Recognition using PyTorch
☆38Updated last year
Alternatives and similar repositories for CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch:
Users that are interested in CelebA-HQ-Face-Identity-and-Attributes-Recognition-PyTorch are comparing it to the libraries listed below
- ☆59Updated 2 years ago
- ☆25Updated 8 months ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆22Updated last year
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Updated 2 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆89Updated 7 months ago
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Updated last year
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆17Updated last year
- ☆65Updated last year
- ☆20Updated last year
- [NeurIPS 2024 D&B Track] UnlearnCanvas: A Stylized Image Dataset to Benchmark Machine Unlearning for Diffusion Models by Yihua Zhang, Cho…☆68Updated 5 months ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆31Updated last year
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆31Updated last year
- ☆18Updated 7 months ago
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆30Updated 3 years ago
- ☆20Updated 2 years ago
- ☆34Updated last year
- Official Pytorch repo of CVPR'23 and NeurIPS'23 papers on understanding replication in diffusion models.☆105Updated last year
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆24Updated 4 years ago
- Differentially Private Diffusion Models☆99Updated last year
- ☆41Updated 3 years ago
- Adversarial Augmentation Against Adversarial Attacks☆31Updated last year
- Consistency Regularization for Adversarial Robustness (AAAI 2022)☆53Updated 3 years ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆21Updated 2 years ago
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆53Updated 4 years ago
- Certified Patch Robustness via Smoothed Vision Transformers☆42Updated 3 years ago
- This code is the official implementation of WEvade.☆38Updated last year
- PDM-based Purifier☆20Updated 6 months ago
- Official repo for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization☆13Updated last year
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆28Updated 4 years ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆55Updated last year