JinyiW / GuidedDiffusionPurLinks
☆59Updated 2 years ago
Alternatives and similar repositories for GuidedDiffusionPur
Users that are interested in GuidedDiffusionPur are comparing it to the libraries listed below
Sorting:
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆144Updated 2 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆111Updated 3 years ago
- ☆59Updated 2 years ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆111Updated 2 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆37Updated last year
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆94Updated last month
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Updated last year
- ☆54Updated 4 years ago
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆118Updated 3 years ago
- Code for Transferable Unlearnable Examples☆22Updated 2 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆36Updated 7 months ago
- ☆120Updated last month
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Updated 2 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆25Updated 5 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆137Updated 2 months ago
- ☆78Updated last year
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆32Updated 2 years ago
- A curated list of papers for the transferability of adversarial examples☆74Updated last year
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆30Updated last year
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆22Updated last year
- ☆45Updated 2 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Updated 2 years ago
- ☆31Updated last year
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆42Updated last year
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆28Updated 2 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆92Updated 2 years ago
- ☆35Updated 2 years ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated 2 years ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆20Updated last year
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Updated 3 years ago