Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2205.07460
Cited By
Diffusion Models for Adversarial Purification
16 May 2022
Weili Nie
Brandon Guo
Yujia Huang
Chaowei Xiao
Arash Vahdat
Anima Anandkumar
WIGM
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Diffusion Models for Adversarial Purification"
50 / 284 papers shown
Title
Post-train Black-box Defense via Bayesian Boundary Correction
He-Nan Wang
Yunfeng Diao
AAML
42
1
0
29 Jun 2023
Visual Adversarial Examples Jailbreak Aligned Large Language Models
Xiangyu Qi
Kaixuan Huang
Ashwinee Panda
Peter Henderson
Mengdi Wang
Prateek Mittal
AAML
25
138
0
22 Jun 2023
DiffWA: Diffusion Models for Watermark Attack
Xinyu Li
WIGM
12
4
0
22 Jun 2023
You Don't Need Robust Machine Learning to Manage Adversarial Attack Risks
Edward Raff
M. Benaroch
Andrew L. Farris
AAML
22
2
0
16 Jun 2023
Fast Training of Diffusion Models with Masked Transformers
Hongkai Zheng
Weili Nie
Arash Vahdat
Anima Anandkumar
DiffM
39
68
0
15 Jun 2023
DiffAug: A Diffuse-and-Denoise Augmentation for Training Robust Classifiers
Chandramouli Shama Sastry
Sri Harsha Dumpala
Sageev Oore
30
0
0
15 Jun 2023
DIFFender: Diffusion-Based Adversarial Defense against Patch Attacks
Cai Kang
Yinpeng Dong
Zhengyi Wang
Shouwei Ruan
Yubo Chen
Hang Su
Xingxing Wei
AAML
DiffM
22
11
0
15 Jun 2023
Distribution Shift Inversion for Out-of-Distribution Prediction
Runpeng Yu
Songhua Liu
Xingyi Yang
Xinchao Wang
OODD
18
18
0
14 Jun 2023
Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Y. Ma
Zhengyu Zhao
Xinlei He
Zheng Li
Michael Backes
Yang Zhang
AAML
WIGM
16
21
0
13 Jun 2023
A Linearly Convergent GAN Inversion-based Algorithm for Reverse Engineering of Deceptions
D. Thaker
Paris V. Giampouras
René Vidal
AAML
24
0
0
07 Jun 2023
Spear or Shield: Leveraging Generative AI to Tackle Security Threats of Intelligent Network Services
Hongyang Du
Dusit Niyato
Jiawen Kang
Zehui Xiong
K. Lam
Ya-Nan Fang
Yonghui Li
AAML
23
13
0
04 Jun 2023
Invisible Image Watermarks Are Provably Removable Using Generative AI
Xuandong Zhao
Kexun Zhang
Zihao Su
Saastha Vasan
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
Yu-Xiang Wang
Lei Li
WIGM
27
49
0
02 Jun 2023
DistriBlock: Identifying adversarial audio samples by leveraging characteristics of the output distribution
Matías P. Pizarro
D. Kolossa
Asja Fischer
AAML
35
1
0
26 May 2023
Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability
Haotian Xue
Alexandre Araujo
Bin Hu
Yongxin Chen
DiffM
30
41
0
25 May 2023
Detecting Adversarial Data by Probing Multiple Perturbations Using Expected Perturbation Score
Shuhai Zhang
Feng Liu
Jiahao Yang
Yifan Yang
Changsheng Li
Bo Han
Mingkui Tan
DiffM
AAML
34
17
0
25 May 2023
Robust Classification via a Single Diffusion Model
Huanran Chen
Yinpeng Dong
Zhengyi Wang
X. Yang
Chen-Dong Duan
Hang Su
Jun Zhu
74
56
0
24 May 2023
The Best Defense is a Good Offense: Adversarial Augmentation against Adversarial Attacks
I. Frosio
Jan Kautz
AAML
21
15
0
23 May 2023
DiffProtect: Generate Adversarial Examples with Diffusion Models for Facial Privacy Protection
Jiang-Long Liu
Chun Pong Lau
Ramalingam Chellappa
DiffM
34
31
0
23 May 2023
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana Cabral Costa
Tiago Roxo
Hugo Manuel Proença
Pedro R. M. Inácio
AAML
37
50
0
18 May 2023
Content-based Unrestricted Adversarial Attack
Zhaoyu Chen
Bo-wen Li
Shuang Wu
Kaixun Jiang
Shouhong Ding
Wenqiang Zhang
DiffM
29
61
0
18 May 2023
Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples
Wanzhu Jiang
Yunfeng Diao
He-Nan Wang
Jianxin Sun
Hao Wu
Richang Hong
37
18
0
16 May 2023
Diffusion Models for Imperceptible and Transferable Adversarial Attack
Jianqi Chen
H. Chen
Keyan Chen
Yilan Zhang
Zhengxia Zou
Z. Shi
DiffM
29
56
0
14 May 2023
On enhancing the robustness of Vision Transformers: Defensive Diffusion
Raza Imam
Muhammad Huzaifa
Mohammed El-Amine Azz
MedIm
DiffM
41
5
0
14 May 2023
DiffCollage: Parallel Generation of Large Content with Diffusion Models
Qinsheng Zhang
Jiaming Song
Xun Huang
Yongxin Chen
Xuan Li
DiffM
29
82
0
30 Mar 2023
A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion
Haomin Zhuang
Yihua Zhang
Sijia Liu
DiffM
28
62
0
29 Mar 2023
Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder
Tao Sun
Lu Pang
Chao Chen
Haibin Ling
AAML
43
9
0
27 Mar 2023
Text-to-Image Diffusion Models are Zero-Shot Classifiers
Kevin Clark
P. Jaini
DiffM
VLM
27
107
0
27 Mar 2023
Black-box Backdoor Defense via Zero-shot Image Purification
Yucheng Shi
Mengnan Du
Xuansheng Wu
Zihan Guan
Jin Sun
Ninghao Liu
40
28
0
21 Mar 2023
Adversarial Counterfactual Visual Explanations
Guillaume Jeanneret
Loïc Simon
F. Jurie
DiffM
41
27
0
17 Mar 2023
Rethinking Model Ensemble in Transfer-based Adversarial Attacks
Huanran Chen
Yichi Zhang
Yinpeng Dong
Xiao Yang
Hang Su
Junyi Zhu
AAML
28
56
0
16 Mar 2023
Robust Evaluation of Diffusion-Based Adversarial Purification
M. Lee
Dongwoo Kim
34
53
0
16 Mar 2023
The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
H. M. Dolatabadi
S. Erfani
C. Leckie
DiffM
46
17
0
15 Mar 2023
Editing Implicit Assumptions in Text-to-Image Diffusion Models
Hadas Orgad
Bahjat Kawar
Yonatan Belinkov
DiffM
28
86
0
14 Mar 2023
Can Adversarial Examples Be Parsed to Reveal Victim Model Information?
Yuguang Yao
Jiancheng Liu
Yifan Gong
Xiaoming Liu
Yanzhi Wang
X. Lin
Sijia Liu
AAML
MLAU
29
1
0
13 Mar 2023
Defending against Adversarial Audio via Diffusion Model
Shutong Wu
Jiong Wang
Ming-Yu Liu
Weili Nie
Chaowei Xiao
DiffM
32
25
0
02 Mar 2023
Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators
Keane Lucas
Matthew Jagielski
Florian Tramèr
Lujo Bauer
Nicholas Carlini
AAML
30
9
0
27 Feb 2023
Score-based Diffusion Models in Function Space
Jae Hyun Lim
Nikola B. Kovachki
Ricardo Baptista
Christopher Beckham
Kamyar Azizzadenesheli
...
Karsten Kreis
Jan Kautz
Christopher Pal
Arash Vahdat
Anima Anandkumar
DiffM
75
37
0
14 Feb 2023
I
2
^2
2
SB: Image-to-Image Schrödinger Bridge
Guan-Horng Liu
Arash Vahdat
De-An Huang
Evangelos A. Theodorou
Weili Nie
Anima Anandkumar
DiffM
20
132
0
12 Feb 2023
Better Diffusion Models Further Improve Adversarial Training
Zekai Wang
Tianyu Pang
Chao Du
Min-Bin Lin
Weiwei Liu
Shuicheng Yan
DiffM
24
208
0
09 Feb 2023
Adversarial Example Does Good: Preventing Painting Imitation from Diffusion Models via Adversarial Examples
Chumeng Liang
Xiaoyu Wu
Yang Hua
Jiaru Zhang
Yiming Xue
Tao Song
Zhengui Xue
Ruhui Ma
Haibing Guan
DiffM
WIGM
16
116
0
09 Feb 2023
Divide and Compose with Score Based Generative Models
S. Ghimire
Armand Comas
Davin Hill
A. Masoomi
Mario Sznaier
Jennifer Dy
DiffM
27
0
0
05 Feb 2023
Beyond Pretrained Features: Noisy Image Modeling Provides Adversarial Defense
Zunzhi You
Daochang Liu
Bohyung Han
Chang Xu
AAML
VLM
52
4
0
02 Feb 2023
Salient Conditional Diffusion for Defending Against Backdoor Attacks
Brandon B. May
N. Joseph Tatro
Dylan Walker
Piyush Kumar
N. Shnidman
DiffM
24
7
0
31 Jan 2023
Denoising Diffusion Probabilistic Models as a Defense against Adversarial Attacks
Lars Lien Ankile
Anna Midgley
Sebastian Weisshaar
DiffM
16
5
0
17 Jan 2023
Image Denoising: The Deep Learning Revolution and Beyond -- A Survey Paper --
Michael Elad
Bahjat Kawar
Gregory Vaksman
23
72
0
09 Jan 2023
RobArch: Designing Robust Architectures against Adversarial Attacks
Sheng-Hsuan Peng
Weilin Xu
Cory Cornelius
Kevin Li
Rahul Duggal
Duen Horng Chau
Jason Martin
AAML
21
5
0
08 Jan 2023
Beckman Defense
A. V. Subramanyam
OOD
AAML
37
0
0
04 Jan 2023
Adversarially Robust Video Perception by Seeing Motion
Lingyu Zhang
Chengzhi Mao
Junfeng Yang
Carl Vondrick
VGen
AAML
42
2
0
13 Dec 2022
DISCO: Adversarial Defense with Local Implicit Functions
Chih-Hui Ho
Nuno Vasconcelos
AAML
21
38
0
11 Dec 2022
Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Ashish Hooda
Andrey Labunets
Tadayoshi Kohno
Earlence Fernandes
11
2
0
08 Dec 2022
Previous
1
2
3
4
5
6
Next