(AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models
☆11Oct 12, 2024Updated last year
Alternatives and similar repositories for MFA
Users that are interested in MFA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- ☆14Dec 31, 2024Updated last year
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆44May 18, 2025Updated 11 months ago
- Auto1111 port of NVlab's adversarial purification method that uses the forward and reverse processes of diffusion models to remove advers…☆13Aug 8, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆35May 23, 2024Updated last year
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆96Dec 20, 2025Updated 3 months ago
- (AAAI 2024) Transferable Adversarial Attacks for Object Detection using Object-Aware Significant Feature Distortion☆16Dec 13, 2023Updated 2 years ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆25Apr 2, 2024Updated 2 years ago
- The code for paper entitled "Data-Driven Modulation Optimization with LMMSE Equalization for Reliability Enhancement in Underwater Acoust…☆19Apr 9, 2026Updated last week
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆27Aug 27, 2024Updated last year
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆30Nov 19, 2024Updated last year
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- ☆19Oct 10, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Mar 3, 2026Updated last month
- List of papers on Hallucination in LMM☆10Nov 29, 2023Updated 2 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆40Feb 29, 2024Updated 2 years ago
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆109May 6, 2024Updated last year
- ☆10Jun 5, 2021Updated 4 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- ☆11Oct 30, 2024Updated last year
- the pytorch implementation of SubCenterArcface and sphereface2. And i add the prove of easy_margin part of Arcface in the codes.☆12Dec 1, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Jan 14, 2026Updated 3 months ago
- 在线学习网站 教师端+学生端 (课件资源上传下载删除、教学团队、班级管理、学生管理、考勤、作业提交批改评分、讨论区、找回密码)☆11Feb 16, 2022Updated 4 years ago
- ☆15Jan 24, 2018Updated 8 years ago
- Official and maintained implementation of the paper "Differentiable JPEG: The Devil is in the Details" (WACV 2024)☆114Dec 30, 2023Updated 2 years ago
- ☆15Feb 24, 2023Updated 3 years ago
- From Image to Imuge: Immunized Image Generation, official code, implemented by PyTorch, ACMMM 2021 paper☆21Apr 2, 2022Updated 4 years ago
- [NeurIPS 2024 D&B] DetectRL: Benchmarking LLM-Generated Text Detection in Real-World Scenarios☆15Nov 19, 2024Updated last year
- Official pytorch implementation of WACV 2023 Paper "Proactive Deepfake Defence via Identity Watermarking" for both training and evaluatio…☆24Feb 21, 2023Updated 3 years ago
- ☆14May 8, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- ☆12Sep 8, 2023Updated 2 years ago
- A Python implementation of HMAC_DRBG (see, NiST SP 800-90A).☆14Nov 18, 2015Updated 10 years ago
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆14Nov 19, 2024Updated last year
- ☆11Sep 10, 2024Updated last year
- Using Canny edge detector, Hough transform and RANSAC to locate the vanishing point in images☆11Jan 1, 2022Updated 4 years ago
- ☆13Apr 5, 2020Updated 6 years ago