unformal implementation of advdiffuser
☆17Feb 4, 2024Updated 2 years ago
Alternatives and similar repositories for advdiff_impl
Users that are interested in advdiff_impl are comparing it to the libraries listed below
Sorting:
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆19Oct 29, 2025Updated 4 months ago
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆29Jun 12, 2025Updated 8 months ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆116Oct 31, 2023Updated 2 years ago
- SSH connection tool, supporting remote SSH command execution, uploading, downloading files, and reconnecting after disconnection. Support…☆20Dec 18, 2025Updated 2 months ago
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆24Mar 16, 2022Updated 3 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆24Nov 30, 2023Updated 2 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 2 months ago
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆10Feb 5, 2025Updated last year
- ☆11Oct 30, 2024Updated last year
- ☆14Jun 19, 2024Updated last year
- This repository contain the code we used to divide NinaPro database 5 into train set and test set☆11Mar 14, 2019Updated 6 years ago
- ☆48Apr 7, 2025Updated 10 months ago
- GI-PIP: Do We Require Impractical Auxiliary Dataset for Gradient Inversion Attacks? (ICASSP 2024)☆16Apr 18, 2025Updated 10 months ago
- using rulsif for abrupt-change detection focusing on Environment, Usage, References, Introduction, Rulsif abrupt change detection.☆10Sep 3, 2025Updated 5 months ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Apr 30, 2021Updated 4 years ago
- MultiVariate Convolutional Neural Network☆10May 10, 2018Updated 7 years ago
- ☆14Mar 8, 2024Updated last year
- ☆11Sep 8, 2023Updated 2 years ago
- ☆24Sep 11, 2025Updated 5 months ago
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆12Jul 24, 2024Updated last year
- ☆20Sep 23, 2025Updated 5 months ago
- A repository to mass generate deepfake video based on DeepFaceLab repository.☆10Aug 10, 2023Updated 2 years ago
- This repository contains the speaker labeled information of VoxCeleb2 and LRS3 audio-visual datasets. (AAAI 2025)☆13Sep 6, 2024Updated last year
- [NeurIPS 2024 D&B] DetectRL: Benchmarking LLM-Generated Text Detection in Real-World Scenarios☆14Nov 19, 2024Updated last year
- UHD is a surface electromyogram (sEMG) signals database, including original sEMG signals, the starting points and the termination points …☆12Dec 4, 2019Updated 6 years ago
- Tutorials for MATH 4432 Statistical Machine Learning, HKUST, Fall 2022☆11Sep 17, 2024Updated last year
- ☆13Mar 5, 2020Updated 5 years ago
- published in Biomedical Signal Processing and Control☆13May 16, 2020Updated 5 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- BS-Mamba for Black-Soil Area Detection on the Qinghai-Tibetan Plateau☆11Apr 12, 2025Updated 10 months ago
- Implementation for the works "VecGAN: Image-to-Image Translation with Interpretable Latent Directions" (ECCV 2022) and "Face Attribute Ed…☆52Oct 16, 2023Updated 2 years ago
- ☆44Oct 9, 2024Updated last year
- Official implementation for the paper "Unlocking the Hidden Potential of CLIP in Generalizable Deepfake Detection".☆67Nov 17, 2025Updated 3 months ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Aug 9, 2019Updated 6 years ago
- ☆12Nov 25, 2023Updated 2 years ago