ChicForX / advdiff_implLinks
unformal implementation of advdiffuser
☆16Updated last year
Alternatives and similar repositories for advdiff_impl
Users that are interested in advdiff_impl are comparing it to the libraries listed below
Sorting:
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Updated last year
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆112Updated 3 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆37Updated last year
- ☆41Updated last year
- ☆59Updated 2 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Updated 2 years ago
- The code of the ICLR 2024 paper: Adversarial Training on Purification (AToP): Advancing Both Robustness and Generalization☆11Updated last year
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41Updated 2 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Updated last year
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆241Updated last year
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆56Updated last year
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆30Updated last year
- ☆31Updated 2 months ago
- ☆45Updated 3 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆37Updated 2 years ago
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Updated last year
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆17Updated last year
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆77Updated 2 years ago
- ☆22Updated 2 years ago
- ☆36Updated last year
- ☆25Updated 2 years ago
- ☆33Updated this week
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆21Updated 2 years ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆22Updated last year
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆21Updated 9 months ago
- ☆31Updated 4 years ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆20Updated last year
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆105Updated last year
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆320Updated 2 years ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Updated 2 years ago