[ACM MM 2024] ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack
☆14Dec 20, 2024Updated last year
Alternatives and similar repositories for ReToMe-VA
Users that are interested in ReToMe-VA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [NeurIPS 2024] Lumen: a Large multimodal model with versatile vision-centric capabilities☆25Sep 27, 2024Updated last year
- [ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos☆12Mar 29, 2024Updated 2 years ago
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated 2 years ago
- ☆23Oct 28, 2024Updated last year
- [ECCV 2022] MORE: Multi-Order RElation Mining for Dense Captioning in 3D Scenes official implementation☆16Feb 2, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [MM24 Oral] Identity-Driven Multimedia Forgery Detection via Reference Assistance☆120Jul 27, 2025Updated 9 months ago
- Adversarial Examples Detection Benchmark☆17Dec 6, 2024Updated last year
- [CVPR 2023] MSMDFusion: Fusing LiDAR and Camera at Multiple Scales with Multi-Depth Seeds for 3D Object Detection☆206May 20, 2023Updated 2 years ago
- Official implementation of Geometry Cloak [NeurIPS'24]☆24Apr 16, 2025Updated last year
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆24Feb 23, 2024Updated 2 years ago
- ☆12Mar 24, 2023Updated 3 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- The official implementation of "PixelThink: Towards Efficient Chain-of-Pixel Reasoning" (ICML 2026)☆41May 30, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10Mar 4, 2024Updated 2 years ago
- Introducing XSafeClaw: The Open-Source Agent Safety Platform from Fudan University☆148May 2, 2026Updated last week
- Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020)☆10Jan 5, 2022Updated 4 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆44Aug 12, 2023Updated 2 years ago
- ☆14Jan 4, 2023Updated 3 years ago
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)☆18Mar 31, 2025Updated last year
- ☆22Sep 23, 2025Updated 7 months ago
- The evaluation code for A Safety Report on GPT-5.2, Gemini 3 Pro, Qwen3-VL, Grok 4.1 Fast, Nano Banana Pro, and Seedream 4.5☆53Jan 18, 2026Updated 3 months ago
- Official codes for FPR (Accepted by CVPR2025)☆14Mar 19, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆25Jan 17, 2025Updated last year
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- Official codes for GRA (Accepted by ICCV2023)☆17Jul 18, 2023Updated 2 years ago
- A python implementation of pdb2oniom for QM/MM (ONIOM) calculations☆11Oct 2, 2025Updated 7 months ago
- ☆28Feb 19, 2025Updated last year
- Enterprise AI Security Platform - Real-time firewall protection for LLM applications against prompt injection, data leakage, and function…☆23Sep 14, 2025Updated 7 months ago
- Adversarial Tokenization☆39Nov 21, 2025Updated 5 months ago
- Code for the AAAI 2023 paper: "Global-Local Characteristic Excited Cross-Modal Attacks from Images to Video" (accepted).☆14Feb 25, 2024Updated 2 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆16Jul 19, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆17Sep 23, 2022Updated 3 years ago
- A fine-tuned version of ProteinMPNN for generating stable cyclic peptide sequences☆40Feb 2, 2026Updated 3 months ago
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆46Jan 24, 2024Updated 2 years ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆71Sep 6, 2023Updated 2 years ago
- ☆17Apr 28, 2026Updated 2 weeks ago
- Metis-RISE: RL Incentivizes and SFT Enhances Multimodal Reasoning Model Learning☆22Jun 26, 2025Updated 10 months ago
- Fashion_Outfit_Complementary_Item_Retrieval☆15Dec 25, 2020Updated 5 years ago