1 code implementation • 11 Feb 2025 • Sen Peng, Mingyue Wang, Jianfei He, Jijia Yang, Xiaohua Jia
In this paper, we first reveal that the primary reason adversarial examples are effective as protective perturbations in latent diffusion models is the distortion of their latent representations, as demonstrated through qualitative and quantitative experiments.
no code implementations • 13 Jan 2025 • Sen Peng, Weixing Xie, Zilong Wang, Xiaohu Guo, Zhonggui Chen, Baorong Yang, Xiao Dong
We introduce RMAvatar, a novel human avatar representation with Gaussian splatting embedded on mesh to learn clothed avatar from a monocular video.
no code implementations • 25 Dec 2024 • Sen Peng, Jijia Yang, Mingyue Wang, Jianfei He, Xiaohua Jia
Diffusion-based text-to-image models have shown immense potential for various image-related tasks.
no code implementations • 29 Oct 2024 • Jijia Yang, Sen Peng, Xiaohua Jia
In practical application, the widespread deployment of diffusion models often necessitates substantial investment in training.
1 code implementation • 6 Jun 2023 • Sen Peng, Yufei Chen, Cong Wang, Xiaohua Jia
This paper introduces WDM, a novel watermarking solution for diffusion models without imprinting the watermark during task generation.