[VLM-Attack-Survey-2024] Paper list and projects for VLM attacks
☆17Feb 12, 2025Updated last year
Alternatives and similar repositories for VLM_Attack_Paper_List
Users that are interested in VLM_Attack_Paper_List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆30Jun 12, 2025Updated 10 months ago
- ☆14Oct 6, 2024Updated last year
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆27Mar 26, 2025Updated last year
- ☆19Apr 27, 2022Updated 3 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code for paper "Membership Inference Attacks Against Vision-Language Models"☆28Jan 25, 2025Updated last year
- ☆47Apr 7, 2025Updated last year
- code for "Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks"☆27Aug 8, 2023Updated 2 years ago
- ☆17Jul 25, 2022Updated 3 years ago
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆63Apr 7, 2024Updated 2 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Nov 7, 2025Updated 5 months ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- ☆15Jun 4, 2024Updated last year
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- ☆16Sep 17, 2024Updated last year
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆28Aug 17, 2023Updated 2 years ago
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆23Feb 10, 2025Updated last year
- The code for AAAI2023 (Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization)☆13Dec 24, 2022Updated 3 years ago
- IRC-like chat program using POSIX advisory lock covert-channel on time namespaces☆23Nov 12, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆14Mar 9, 2025Updated last year
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated 2 years ago
- [TIP 2024] PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition☆15Nov 30, 2023Updated 2 years ago
- ☆14Mar 10, 2025Updated last year
- New distributional and shape attacks on neural networks that process 3D point cloud data.☆43Mar 24, 2023Updated 3 years ago
- Voint Cloud: Multi-View Point Cloud Representation for 3D Understanding (ICLR 2023)☆22May 2, 2023Updated 2 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- [ECCV 2022: Oral] In this work, we discover that color is a crtical transferable forensic feature (T-FF) in universal detectors for detec…☆16Jan 25, 2023Updated 3 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A web app that learns to repair your command line mistakes.☆15Jan 13, 2017Updated 9 years ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- ☆11Oct 30, 2024Updated last year
- Code and data for the ACM CIKM 2024 paper "Adversarial Text Rewriting for Text-aware Recommender Systems"☆12Aug 1, 2024Updated last year
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆70Aug 7, 2025Updated 8 months ago
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆46Jan 24, 2024Updated 2 years ago