whulizheng / Anti-DiffusionLinks
☆8Updated 6 months ago
Alternatives and similar repositories for Anti-Diffusion
Users that are interested in Anti-Diffusion are comparing it to the libraries listed below
Sorting:
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆15Updated last year
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆45Updated 10 months ago
- ☆18Updated last year
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆14Updated 3 years ago
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Updated 2 years ago
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆41Updated last year
- ☆30Updated 3 years ago
- This repository is the official implementation of "DiffusionFake: Enhancing Generalization in Deepfake Detection via Guided Stable Diffus…☆50Updated 8 months ago
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆22Updated 3 years ago
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆32Updated 2 months ago
- ☆24Updated last year
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆22Updated last year
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆16Updated 10 months ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆32Updated last year
- We propose a statistical consistency attack (StatAttack) against diverse DeepFake detectors.☆11Updated last year
- ☆27Updated 10 months ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆34Updated 2 months ago
- ☆11Updated 7 months ago
- ☆25Updated 2 weeks ago
- This is the official repository for the ECCV 2022 paper "RepMix: Representation Mixing for Robust Attribution of Synthesized Images"☆18Updated 2 years ago
- PyTorch implementation of “Purified and Unified Steganographic Networks” (CVPR 2024)☆38Updated 11 months ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆44Updated 8 months ago
- [IJCV 2025] Code for DeepFake-Adapter: Dual-Level Adapter for DeepFake Detection☆51Updated 6 months ago
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆50Updated last year
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆36Updated 10 months ago
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆21Updated last month
- Code of the paper: A Recipe for Watermarking Diffusion Models☆147Updated 7 months ago
- ☆31Updated last year
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆50Updated 9 months ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆18Updated last year