Diffusion models: A comprehensive survey of methods and applications

L Yang, Z Zhang, Y Song, S Hong, R Xu, Y Zhao… - ACM Computing …, 2023 - dl.acm.org
Diffusion models have emerged as a powerful new family of deep generative models with
record-breaking performance in many applications, including image synthesis, video …

Better diffusion models further improve adversarial training

Z Wang, T Pang, C Du, M Lin… - … on Machine Learning, 2023 - proceedings.mlr.press
It has been recognized that the data generated by the denoising diffusion probabilistic
model (DDPM) improves adversarial training. After two years of rapid development in …

Generative diffusion prior for unified image restoration and enhancement

B Fei, Z Lyu, L Pan, J Zhang, W Yang… - Proceedings of the …, 2023 - openaccess.thecvf.com
Existing image restoration methods mostly leverage the posterior distribution of natural
images. However, they often assume known degradation and also require supervised …

A pilot study of query-free adversarial attack against stable diffusion

H Zhuang, Y Zhang, S Liu - … of the IEEE/CVF Conference on …, 2023 - openaccess.thecvf.com
Despite the record-breaking performance in Text-to-Image (T2I) generation by Stable
Diffusion, less research attention is paid to its adversarial robustness. In this work, we study …

Diffusion-based adversarial sample generation for improved stealthiness and controllability

H Xue, A Araujo, B Hu, Y Chen - Advances in Neural …, 2024 - proceedings.neurips.cc
Neural networks are known to be susceptible to adversarial samples: small variations of
natural examples crafted to deliberatelymislead the models. While they can be easily …

Diffusioninst: Diffusion model for instance segmentation

Z Gu, H Chen, Z Xu - ICASSP 2024-2024 IEEE International …, 2024 - ieeexplore.ieee.org
Diffusion frameworks have achieved comparable performance with previous state-of-the-art
image generation models. This paper proposes DiffusionInst, a novel framework …

Robust evaluation of diffusion-based adversarial purification

M Lee, D Kim - Proceedings of the IEEE/CVF International …, 2023 - openaccess.thecvf.com
We question the current evaluation practice on diffusion-based purification methods.
Diffusion-based purification methods aim to remove adversarial effects from an input data …

Diffattack: Evasion attacks against diffusion-based adversarial purification

M Kang, D Song, B Li - Advances in Neural Information …, 2024 - proceedings.neurips.cc
Diffusion-based purification defenses leverage diffusion models to remove crafted
perturbations of adversarial examples and achieve state-of-the-art robustness. Recent …

{DiffSmooth}: Certifiably robust learning via diffusion models and local smoothing

J Zhang, Z Chen, H Zhang, C Xiao, B Li - 32nd USENIX Security …, 2023 - usenix.org
Diffusion models have been leveraged to perform adversarial purification and thus provide
both empirical and certified robustness for a standard model. On the other hand, different …

Unlearnable examples give a false sense of security: Piercing through unexploitable data with learnable examples

W Jiang, Y Diao, H Wang, J Sun, M Wang… - Proceedings of the 31st …, 2023 - dl.acm.org
Safeguarding data from unauthorized exploitation is vital for privacy and security, especially
in recent rampant research in security breach such as adversarial/membership attacks. To …