(AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models
☆11Oct 12, 2024Updated last year
Alternatives and similar repositories for MFA
Users that are interested in MFA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- ☆14Dec 31, 2024Updated last year
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆44May 18, 2025Updated 10 months ago
- Official repository for "On the Multi-modal Vulnerability of Diffusion Models"☆16Jul 15, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆35May 23, 2024Updated last year
- ACM MM 2023 | Learning a Graph Neural Network with Cross Modality Interaction for Image Fusion☆42Nov 3, 2023Updated 2 years ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆96Dec 20, 2025Updated 3 months ago
- AAAI 2025 | A2RNet: Adversarial Attack Resilient Network for Robust Infrared and Visible Image Fusion☆31Oct 10, 2025Updated 5 months ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- ☆23Jul 1, 2025Updated 8 months ago
- The code for paper entitled "Data-Driven Modulation Optimization with LMMSE Equalization for Reliability Enhancement in Underwater Acoust…☆19Oct 4, 2025Updated 5 months ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆27Aug 27, 2024Updated last year
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆27Nov 19, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Mar 3, 2026Updated 3 weeks ago
- List of papers on Hallucination in LMM☆10Nov 29, 2023Updated 2 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆39Feb 29, 2024Updated 2 years ago
- ☆12Jul 16, 2025Updated 8 months ago
- ☆10Jun 5, 2021Updated 4 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Oct 30, 2024Updated last year
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆23Jan 9, 2025Updated last year
- ☆12Jan 14, 2026Updated 2 months ago
- 在线学习网站 教师端+学生端 (课件资源上传下载删除、教学团队、班级管理、学生管理、考勤、作业提交批改评分、讨论区、找回密码)☆11Feb 16, 2022Updated 4 years ago
- Official and maintained implementation of the paper "Differentiable JPEG: The Devil is in the Details" (WACV 2024)☆112Dec 30, 2023Updated 2 years ago
- ☆15Feb 24, 2023Updated 3 years ago
- From Image to Imuge: Immunized Image Generation, official code, implemented by PyTorch, ACMMM 2021 paper☆21Apr 2, 2022Updated 3 years ago
- Official pytorch implementation of WACV 2023 Paper "Proactive Deepfake Defence via Identity Watermarking" for both training and evaluatio…☆24Feb 21, 2023Updated 3 years ago
- [NeurIPS 2024 D&B] DetectRL: Benchmarking LLM-Generated Text Detection in Real-World Scenarios☆14Nov 19, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- [CVPR 2026 Findings] Eevee: Towards Close-up High-resolution Video-based Virtual Try-on☆70Feb 27, 2026Updated last month
- Learning a grayscale image that can be fully restored to its orignal color version.☆25Jan 18, 2022Updated 4 years ago
- ☆14May 8, 2024Updated last year
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- ☆11Sep 8, 2023Updated 2 years ago
- A Python implementation of HMAC_DRBG (see, NiST SP 800-90A).☆14Nov 18, 2015Updated 10 years ago
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆13Nov 19, 2024Updated last year