zhengyuan-jiang / WEvade
This code is the official implementation of WEvade.
☆37Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for WEvade
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆18Updated 11 months ago
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆70Updated last year
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆31Updated last year
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆23Updated 8 months ago
- ☆78Updated 3 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆82Updated 2 months ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆28Updated 3 months ago
- ☆41Updated last year
- ☆35Updated last year
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆23Updated 3 weeks ago
- [CVPR 2024] official code for SimAC☆15Updated 2 months ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆36Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆51Updated 7 months ago
- ☆22Updated last year
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆20Updated last year
- ☆19Updated 3 months ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆12Updated 7 months ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆58Updated 2 years ago
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆16Updated 6 months ago
- ☆46Updated last year
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆17Updated 11 months ago
- ☆16Updated 6 months ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆48Updated last year
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆22Updated last month
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆18Updated last month
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆31Updated 2 years ago
- This is the official repository for the ECCV 2022 paper "RepMix: Representation Mixing for Robust Attribution of Synthesized Images"☆16Updated 2 years ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆44Updated 7 months ago
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆68Updated 5 months ago
- ☆22Updated 3 months ago