ryanwebster90 / onestep-extractionLinks
☆43Updated last year
Alternatives and similar repositories for onestep-extraction
Users that are interested in onestep-extraction are comparing it to the libraries listed below
Sorting:
- [ICCV 2023] Source code for our paper "Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models".☆62Updated last year
- Official Pytorch repo of CVPR'23 and NeurIPS'23 papers on understanding replication in diffusion models.☆108Updated last year
- The official implementation of ECCV'24 paper "To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Uns…☆78Updated 4 months ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆92Updated 2 months ago
- ☆58Updated 2 years ago
- Forget-Me-Not: Learning to Forget in Text-to-Image Diffusion Models, 2023☆131Updated 2 years ago
- Official Implementation of Safe Latent Diffusion for Text2Image☆89Updated 2 years ago
- ☆20Updated last year
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆309Updated 2 years ago
- ☆308Updated last year
- Code of the paper: A Recipe for Watermarking Diffusion Models☆147Updated 8 months ago
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆50Updated last year
- ☆14Updated 4 months ago
- [NeurIPS 2024 D&B Track] UnlearnCanvas: A Stylized Image Dataset to Benchmark Machine Unlearning for Diffusion Models by Yihua Zhang, Cho…☆71Updated 8 months ago
- ☆31Updated 2 years ago
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆28Updated 8 months ago
- ☆28Updated 11 months ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆21Updated last year
- Anti-DreamBooth: Protecting users from personalized text-to-image synthesis (ICCV 2023)☆240Updated 6 months ago
- ☆32Updated 6 months ago
- ☆33Updated last year
- Code for our paper "Benchmarking the Robustness of Image Watermarks"☆86Updated 10 months ago
- [ICML 2024] Prompting4Debugging: Red-Teaming Text-to-Image Diffusion Models by Finding Problematic Prompts (Official Pytorch Implementati…☆44Updated 7 months ago
- Code for the paper "Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks"☆35Updated last year
- Ablating Concepts in Text-to-Image Diffusion Models (ICCV 2023)☆160Updated 6 months ago
- CelebA HQ Face Identity and Attributes Recognition using PyTorch☆39Updated last year
- [ICCV 2023 Oral] Official implementation of "Robust Evaluation of Diffusion-Based Adversarial Purification"☆25Updated last year
- This code is the official implementation of WEvade.☆40Updated last year
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Updated 2 years ago
- ☆33Updated last year