This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model
☆21Jul 30, 2024Updated last year
Alternatives and similar repositories for StealthDiffusion
Users that are interested in StealthDiffusion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- RobustBenchHAR: an adversarial robustness benchmark for Skeleton-based Human Activity Recognition [ICLR 2025 TASAR: TRANSFER-BASED ATTACK…☆22May 23, 2025Updated 11 months ago
- Official code for LaRE2: Latent Reconstruction Error Based Method for Diffusion-Generated Image Detection. (CVPR 2024)☆54Dec 3, 2024Updated last year
- ☆16Dec 18, 2023Updated 2 years ago
- ☆39Aug 30, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code for paper "Robustness of Bayesian Neural Networks to Gradient-Based Attacks"☆17Feb 26, 2024Updated 2 years ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆20Aug 22, 2024Updated last year
- Respect to the input tensor instead of paramters of NN☆21Jul 18, 2022Updated 3 years ago
- Code repository for the ECAI 2025 paper: Diffusion Noise Feature: Accurate and Fast Generated Image Detection.☆25Jan 28, 2026Updated 3 months ago
- An unofficial implementation of the paper《Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective》☆22Nov 24, 2022Updated 3 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- [NDSS'25] The official implementation of safety misalignment.☆19Jan 8, 2025Updated last year
- AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models☆21Nov 8, 2025Updated 6 months ago
- Corresponding Code to the Paper "Fake or JPEG? Revealing Common Biases in Generated Image Detection Datasets"☆29Sep 11, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆117Jul 21, 2022Updated 3 years ago
- [CVPR'25] CO-SPY: Combining Semantic and Pixel Features to Detect Synthetic Images by AI☆45May 4, 2026Updated 2 weeks ago
- When Visualizing is the First Step to Reasoning: MIRA, a Benchmark for Visual Chain-of-Thought☆32Feb 14, 2026Updated 3 months ago
- Code for Transferable Unlearnable Examples☆22Mar 11, 2023Updated 3 years ago
- ☆35Jul 18, 2024Updated last year
- ☆23Sep 5, 2025Updated 8 months ago
- A lightweight cross-platform prompt manager for researchers to organize, reuse, and iterate high-quality prompts.☆46Apr 12, 2026Updated last month
- ☆31May 30, 2024Updated last year
- ☆31Dec 8, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The download methods of Vision-language Continual Pretraining Dataset P9D.☆12Jan 3, 2025Updated last year
- Project shadows from sprites on transparent backgrounds☆13Aug 14, 2025Updated 9 months ago
- This is the official repository for the code and datasets in the paper "Progressive Open Space Expansion for Open-Set Model Attribution",…☆25Oct 22, 2023Updated 2 years ago
- ☆13Apr 11, 2024Updated 2 years ago
- ☆11Dec 23, 2024Updated last year
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆41Feb 29, 2024Updated 2 years ago
- Official repository of "A Hitchhiker's Guide to Fine-Grained Face Forgery Detection Using Common Sense Reasoning" published in NeurIPS'20…☆12Feb 7, 2025Updated last year
- [CVPR 2024] The official repo for Forgery-aware Adaptive Transformer for Generalizable Synthetic Image Detection☆134Aug 15, 2024Updated last year
- C2P-CLIP-DeepfakeDetection☆98Dec 26, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Python framework for reliably assessing synthetic image detection methods☆50Jul 16, 2025Updated 10 months ago
- Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature☆31Sep 25, 2024Updated last year
- [ICLR 2025] DGQ: Distribution-Aware Group Quantization for Text-to-Image Diffusion Models☆19Mar 25, 2025Updated last year
- Official Repository for "Ten Words Only Still Help: Improving Black-Box AI-Generated Text Detection via Proxy-Guided Efficient Re-Samplin…☆23Aug 15, 2024Updated last year
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆264Nov 23, 2025Updated 5 months ago
- AGIQA-1k-Database for AI Generated Content Image Quality Assessment☆29May 1, 2023Updated 3 years ago
- This is a task detecting face is from generating models or not☆16May 8, 2025Updated last year