Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode
☆17Feb 16, 2025Updated last year
Alternatives and similar repositories for daca
Users that are interested in daca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆199Apr 7, 2025Updated last year
- Official repository for "On the Multi-modal Vulnerability of Diffusion Models"☆16Jul 15, 2024Updated last year
- ☆35May 22, 2024Updated last year
- ☆43Jan 15, 2025Updated last year
- List of T2I safety papers, updated daily, welcome to discuss using Discussions☆68Aug 12, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- [ICML 2024] Prompting4Debugging: Red-Teaming Text-to-Image Diffusion Models by Finding Problematic Prompts (Official Pytorch Implementati…☆51Jan 11, 2026Updated 4 months ago
- Text file containing NSFW words aggregated from various sources.☆11Aug 23, 2020Updated 5 years ago
- This is the official repo of the paper "Latent Guard: a Safety Framework for Text-to-image Generation"☆54Oct 24, 2024Updated last year
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆27Aug 27, 2024Updated last year
- Official Implementation of Safe Latent Diffusion for Text2Image☆97Apr 21, 2023Updated 3 years ago
- ☆20Feb 3, 2025Updated last year
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆98Dec 20, 2025Updated 4 months ago
- ☆13Jan 14, 2026Updated 4 months ago
- ☆14Jun 6, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆40Oct 17, 2024Updated last year
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆49Apr 19, 2026Updated last month
- ☆48Jul 14, 2024Updated last year
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- ☆23Dec 14, 2023Updated 2 years ago
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆204Jun 26, 2025Updated 10 months ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- [CVPR2024] MMA-Diffusion: MultiModal Attack on Diffusion Models☆385Jan 8, 2026Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Sep 25, 2019Updated 6 years ago
- ☆52May 24, 2023Updated 2 years ago
- Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Models☆275May 13, 2024Updated 2 years ago
- ☆56Dec 7, 2024Updated last year
- ☆69Sep 30, 2025Updated 7 months ago
- [WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability☆18May 30, 2025Updated 11 months ago
- The official implementation of ECCV'24 paper "To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Uns…☆87Feb 28, 2025Updated last year
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- ☆23Feb 5, 2026Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆60Jun 5, 2024Updated last year
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆20Aug 22, 2024Updated last year
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆31Nov 15, 2025Updated 6 months ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆21Jan 24, 2024Updated 2 years ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆68Mar 20, 2023Updated 3 years ago
- ☆20Sep 13, 2021Updated 4 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago