[VLM-Attack-Survey-2024] Paper list and projects for VLM attacks
☆17Feb 12, 2025Updated last year
Alternatives and similar repositories for VLM_Attack_Paper_List
Users that are interested in VLM_Attack_Paper_List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆31Jun 12, 2025Updated 10 months ago
- ☆14Oct 6, 2024Updated last year
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆28Mar 26, 2025Updated last year
- ☆18Apr 27, 2022Updated 4 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This repository is for the implementation of SGWN.☆14Oct 12, 2024Updated last year
- ☆47Apr 7, 2025Updated last year
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- code for "Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks"☆27Aug 8, 2023Updated 2 years ago
- Code for paper "Membership Inference Attacks Against Vision-Language Models"☆29Jan 25, 2025Updated last year
- ☆17Jul 25, 2022Updated 3 years ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆56Oct 14, 2024Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆63Apr 7, 2024Updated 2 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The official implementation of 'A human-machine collaborative approach measures economic development using satellite imagery'.☆18Apr 11, 2023Updated 3 years ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- our code for paper '3D Adversarial Attacks Beyond Point Cloud ', Information Sciences, 2023☆36Mar 15, 2023Updated 3 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆30Aug 24, 2021Updated 4 years ago
- Flow Integrity Deterministic Enforcement System. Mechanisms for securing AI agents with information-flow control.☆90May 30, 2025Updated 11 months ago
- ☆13Nov 7, 2025Updated 5 months ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆31Jul 21, 2025Updated 9 months ago
- ☆15Jun 4, 2024Updated last year
- ☆16Sep 17, 2024Updated last year
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆28Aug 17, 2023Updated 2 years ago
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆23Feb 10, 2025Updated last year
- The code for AAAI2023 (Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization)☆13Dec 24, 2022Updated 3 years ago
- IRC-like chat program using POSIX advisory lock covert-channel on time namespaces☆23Nov 12, 2025Updated 5 months ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆33Jun 7, 2022Updated 3 years ago
- ☆15Mar 9, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated 2 years ago
- A numpy like array programming language optimized with BuildIt☆14Oct 17, 2025Updated 6 months ago
- [TIP 2024] PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition☆15Nov 30, 2023Updated 2 years ago
- ☆14Mar 10, 2025Updated last year
- New distributional and shape attacks on neural networks that process 3D point cloud data.☆42Mar 24, 2023Updated 3 years ago
- Voint Cloud: Multi-View Point Cloud Representation for 3D Understanding (ICLR 2023)☆22May 2, 2023Updated 3 years ago
- This is the official code for the paper "Virus: Harmful Fine-tuning Attack for Large Language Models Bypassing Guardrail Moderation"☆56Feb 2, 2025Updated last year