GZHU-DVL / AttackVQA
☆18Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for AttackVQA
- [ICCV 2023] Towards Building More Robust Models with Frequency Bias☆15Updated 8 months ago
- List of T2I safety papers, updated daily, welcome to discuss using Discussions☆42Updated 2 months ago
- Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020)☆10Updated 2 years ago
- ☆22Updated 3 months ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆20Updated 3 months ago
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆18Updated last month
- Code and datasets of TPAMI 2022 paper《OPOM: Customized Invisible Cloak towards Face Privacy Protection》☆20Updated 2 years ago
- Code for "JPEG-resistant Adversarial Images"☆39Updated 6 years ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆39Updated last month
- ☆60Updated 3 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆48Updated last year
- ☆30Updated 5 months ago
- PyTorch implementation of “Purified and Unified Steganographic Networks” (CVPR 2024)☆27Updated 3 months ago
- ☆13Updated 2 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆36Updated 4 years ago
- [CVPR 2024🔥] EditGuard: Versatile Image Watermarking for Tamper Localization and Copyright Protection☆168Updated last month
- [CVPR'24 Oral] Metacloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning☆19Updated 3 months ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆24Updated 2 years ago
- A repository to caculate the just noticable difference of an image by Python☆23Updated 3 years ago
- Author implementation of Exploring Adversarial Fake Images on Face Manifold (CVPR 2021 oral)☆31Updated last year
- This is a collection of awesome papers I have read (carefully or roughly) in the fields of security in diffusion models. Any suggestions …☆20Updated last week
- Synthetic Image Detection☆51Updated 8 months ago
- ☆52Updated last year
- ☆46Updated last year
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆33Updated 3 years ago
- [NeurIPS 2023] Official PyTorch implementation for the paper "CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganog…☆103Updated 4 months ago
- ☆18Updated 9 months ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆89Updated 2 years ago
- The offical implementation of 'FFAA: Multimodal Large Language Model based Explainable Open-World Face Forgery Analysis Assistant'☆13Updated last month
- [CVPR 2021: Oral] In this work, we show that high frequency Fourier spectrum decay discrepancies are not inherent characteristics for exi…☆28Updated 3 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆38Updated 2 years ago