[ACM MM 2024] ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack
☆14Dec 20, 2024Updated last year
Alternatives and similar repositories for ReToMe-VA
Users that are interested in ReToMe-VA are comparing it to the libraries listed below
Sorting:
- [ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos☆12Mar 29, 2024Updated last year
- EventHallusion: Diagnosing Event Hallucinations in Video LLMs☆34Aug 5, 2025Updated 7 months ago
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated last year
- ☆24Oct 28, 2024Updated last year
- [MM24 Oral] Identity-Driven Multimedia Forgery Detection via Reference Assistance☆119Jul 27, 2025Updated 7 months ago
- Adversarial Examples Detection Benchmark☆17Dec 6, 2024Updated last year
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆13Feb 28, 2024Updated 2 years ago
- ☆21Jan 17, 2025Updated last year
- Open-source red teaming framework for MLLMs with 37+ attack methods☆226Mar 2, 2026Updated last week
- [ECCV 2024] Reliable and Efficient Concept Erasure of Text-to-Image Diffusion Models☆84Oct 29, 2024Updated last year
- Offline implementation of UniREditBench: A Unified Reasoning-based Image Editing Benchmark.☆52Jan 7, 2026Updated 2 months ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- Enterprise AI Security Platform - Real-time firewall protection for LLM applications against prompt injection, data leakage, and function…☆23Sep 14, 2025Updated 5 months ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack(TPAMI 2025)☆43Aug 28, 2025Updated 6 months ago
- A python implementation of pdb2oniom for QM/MM (ONIOM) calculations☆11Oct 2, 2025Updated 5 months ago
- It is the official code of the AAAI-24 paper "Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain"☆17Oct 11, 2025Updated 4 months ago
- ☆24Dec 5, 2025Updated 3 months ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆10Oct 16, 2020Updated 5 years ago
- ☆14Feb 26, 2025Updated last year
- Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020)☆10Jan 5, 2022Updated 4 years ago
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year
- ☆12Sep 22, 2023Updated 2 years ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)☆18Mar 31, 2025Updated 11 months ago
- Virus Protein Structural Analysis Toolkit☆13Sep 9, 2024Updated last year
- ☆14Oct 6, 2024Updated last year
- ☆17Dec 23, 2024Updated last year
- ☆13Feb 1, 2024Updated 2 years ago
- Robust Adversarial Objects against Deep Learning Models☆12Mar 28, 2020Updated 5 years ago
- 基于Tensorflow卷积神经网络天气图像识别系统设计毕业源码案例设计☆14Apr 27, 2023Updated 2 years ago
- Syclops is a tool for creating synthetic data from 3D virtual environments with photorealistic renderings and pixel-perfect annotations.☆15Jun 26, 2025Updated 8 months ago
- Official codes for FPR (Accepted by CVPR2025)☆13Mar 19, 2025Updated 11 months ago
- ☆14Jun 18, 2020Updated 5 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- ☆10Mar 4, 2024Updated 2 years ago
- Evaluating Durability: Benchmark Insights into Multimodal Watermarking☆12Jun 7, 2024Updated last year
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year