[ICML 2024] Prompting4Debugging: Red-Teaming Text-to-Image Diffusion Models by Finding Problematic Prompts (Official Pytorch Implementation)
☆52Jan 11, 2026Updated 2 months ago
Alternatives and similar repositories for P4D
Users that are interested in P4D are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The official implementation of ECCV'24 paper "To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Uns…☆87Feb 28, 2025Updated last year
- ☆12Jan 14, 2026Updated 2 months ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- ☆39Jan 15, 2025Updated last year
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆17Feb 16, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- ☆42Jun 1, 2023Updated 2 years ago
- ☆23Feb 5, 2026Updated last month
- ☆48Jul 14, 2024Updated last year
- Official implementation of NeurIPS'24 paper "Defensive Unlearning with Adversarial Training for Robust Concept Erasure in Diffusion Model…☆50Nov 4, 2024Updated last year
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆96Dec 20, 2025Updated 3 months ago
- ☆197Apr 7, 2025Updated 11 months ago
- ☆35May 22, 2024Updated last year
- [CVPR2024] MMA-Diffusion: MultiModal Attack on Diffusion Models☆386Jan 8, 2026Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- [ECCV 2024] Reliable and Efficient Concept Erasure of Text-to-Image Diffusion Models☆87Oct 29, 2024Updated last year
- [ECCV 2024] "Receler: Reliable Concept Erasing of Text-to-Image Diffusion Models via Lightweight Erasers" (Official Implementation)☆44Mar 2, 2025Updated last year
- ☆28May 28, 2023Updated 2 years ago
- List of T2I safety papers, updated daily, welcome to discuss using Discussions☆68Aug 12, 2024Updated last year
- Unified Concept Editing in Diffusion Models☆186Dec 7, 2025Updated 3 months ago
- ☆19May 14, 2025Updated 10 months ago
- A Survey on Jailbreak Attacks and Defenses against Multimodal Generative Models☆311Jan 11, 2026Updated 2 months ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆35Oct 23, 2024Updated last year
- Official repository for "On the Multi-modal Vulnerability of Diffusion Models"☆16Jul 15, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆14Mar 1, 2019Updated 7 years ago
- Accepted by ECCV 2024☆196Oct 15, 2024Updated last year
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- Erasing Concepts from Diffusion Models☆661Updated this week
- A repository of resources on machine unlearning for diffusion models☆60Oct 9, 2025Updated 5 months ago
- ☆16Sep 4, 2024Updated last year
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆40Jul 8, 2024Updated last year
- [NeurIPS-2023] Annual Conference on Neural Information Processing Systems☆225Dec 22, 2024Updated last year
- Responsible Visual Editing☆15Jul 10, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆18Jul 1, 2021Updated 4 years ago
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆138Jul 1, 2025Updated 8 months ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- ☆25Jun 17, 2025Updated 9 months ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆20Aug 22, 2024Updated last year
- Code for ACM MM2024 paper: White-box Multimodal Jailbreaks Against Large Vision-Language Models☆32Dec 30, 2024Updated last year
- Fluent student-teacher redteaming☆23Jul 25, 2024Updated last year