ChicForX / advdiff_implLinks
unformal implementation of advdiffuser
☆15Updated last year
Alternatives and similar repositories for advdiff_impl
Users that are interested in advdiff_impl are comparing it to the libraries listed below
Sorting:
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆36Updated last year
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆31Updated last year
- ☆41Updated 11 months ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41Updated 2 years ago
- The code of the ICLR 2024 paper: Adversarial Training on Purification (AToP): Advancing Both Robustness and Generalization☆11Updated 9 months ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆111Updated 3 years ago
- ☆59Updated 2 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆58Updated last year
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆17Updated last year
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆226Updated 11 months ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆37Updated 2 years ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆110Updated last year
- ☆25Updated last year
- ☆24Updated last month
- ☆22Updated 2 years ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆30Updated 11 months ago
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Updated 11 months ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Updated last year
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆53Updated last year