Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)
☆18Mar 31, 2025Updated 11 months ago
Alternatives and similar repositories for DisDiff
Users that are interested in DisDiff are comparing it to the libraries listed below
Sorting:
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆13Nov 19, 2024Updated last year
- ☆14Dec 31, 2024Updated last year
- ☆28Aug 7, 2024Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆60Apr 7, 2024Updated last year
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆34May 23, 2024Updated last year
- ☆49Jun 19, 2024Updated last year
- Official implementation of Geometry Cloak [NeurIPS'24]☆24Apr 16, 2025Updated 10 months ago
- [ECCV 2024🔥] The official code for the paper DiffFAS: Face Anti-Spoofing via Generative Diffusion Models.☆42Sep 23, 2024Updated last year
- Official implementation of "Prompt-Agnostic Adversarial Perturbation for Customized Diffusion Models"☆25May 30, 2025Updated 9 months ago
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆28Nov 19, 2024Updated last year
- [ECCV 2024] Robust-Wide: Robust Watermarking against Instruction-driven Image Editing (Official Implementation)☆33May 30, 2025Updated 9 months ago
- ☆26Nov 7, 2023Updated 2 years ago
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆43May 18, 2025Updated 9 months ago
- Edit Away and My Face Will not Stay: Personal Biometric Defense against Malicious Generative Editing☆53Dec 17, 2024Updated last year
- Face Depth map Generation using PRNet☆10Dec 21, 2020Updated 5 years ago
- ☆12Oct 17, 2024Updated last year
- Video packaging platform - this will build a Docker with a web API that will let you upload, encrypt and serve videos as MPEG DASH files☆11Sep 6, 2020Updated 5 years ago
- Cambridge Arboreal Modelling Panoptic 3D: Pipeline and Dataset☆25Sep 16, 2025Updated 5 months ago
- [ECCV 2024] "Prediction Exposes Your Face: Black-box Model Inversion via Prediction Alignment"☆15Mar 12, 2025Updated 11 months ago
- Auto1111 port of NVlab's adversarial purification method that uses the forward and reverse processes of diffusion models to remove advers…☆13Aug 8, 2023Updated 2 years ago
- ☆11Oct 25, 2023Updated 2 years ago
- SuperGS: Super-Resolution 3D Gaussian Splatting Enhanced by Variational Residual Features and Uncertainty-Augmented Learning☆11May 24, 2025Updated 9 months ago
- 📖Curated list about reasoning abilitiy of MLLM, including OpenAI o1, OpenAI o3-mini, and Slow-Thinking.☆13Feb 7, 2025Updated last year
- RESAnything: Attribute Prompting for Arbitrary Referring Segmentation☆17Nov 28, 2025Updated 3 months ago
- [ACM MM 2022] Patch-based Knowledge Distillation for Lifelong Person Re-Identification☆10Apr 20, 2023Updated 2 years ago
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆13Jun 20, 2023Updated 2 years ago
- [ICLR 2024] Towards Elminating Hard Label Constraints in Gradient Inverision Attacks☆14Feb 6, 2024Updated 2 years ago
- Towards Deep Learning Models Resistant to Adversarial Attacks论文复现☆15Aug 18, 2021Updated 4 years ago
- Benchmarking Joint Face Spoofing and Forgery Detection with Visual and Physiological Cues (TDSC'24)☆14Jan 14, 2024Updated 2 years ago
- ☆10Jan 18, 2024Updated 2 years ago
- [NeurIPS 2023] Official PyTorch implementation for the paper "CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganog…☆11Sep 28, 2023Updated 2 years ago
- simple solution based on Gradient Boost and Random Forest, rank 24/3251 (top 1%) within 60 lines of python code☆14Jun 21, 2019Updated 6 years ago
- ☆17Jul 18, 2024Updated last year
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆17Jan 17, 2025Updated last year
- ☆20Apr 15, 2025Updated 10 months ago
- Watermark you artworks to stay away from unauthorized diffusion style mimicry!☆356May 30, 2025Updated 9 months ago
- The code for AAAI2023 (Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization)☆13Dec 24, 2022Updated 3 years ago