☆25Feb 14, 2024Updated 2 years ago
Alternatives and similar repositories for GE-advGAN
Users that are interested in GE-advGAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- [ECCV 2024] "REVISION: Rendering Tools Enable Spatial Fidelity in Vision-Language Models"☆13Aug 6, 2024Updated last year
- ☆28Sep 22, 2022Updated 3 years ago
- ☆20Jan 13, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆12Apr 27, 2022Updated 4 years ago
- Official repository for "Boosting Adversarial Transferability using Dynamic Cues " (ICLR 2023)☆20Aug 24, 2023Updated 2 years ago
- [IEEE VR'22] SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image Classifiers☆12Jun 21, 2025Updated 10 months ago
- Implementation of Adversarial Multi-Distillation for Automatic Modulation Recognition Models.☆27Nov 2, 2023Updated 2 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆119Oct 31, 2023Updated 2 years ago
- The implementation of our ACM MM 2023 paper "AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning"☆99Aug 25, 2023Updated 2 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 9 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Code repository for CVPR2024 paper 《Pre-trained Model Guided Fine-Tuning for Zero-Shot Adversarial Robustness》☆25May 29, 2024Updated last year
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆27Aug 27, 2024Updated last year
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Mar 28, 2026Updated last month
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆35Mar 29, 2023Updated 3 years ago
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆31Jun 12, 2025Updated 10 months ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Aug 8, 2023Updated 2 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆467Feb 27, 2026Updated 2 months ago
- AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds (ECCV 2020)☆44Oct 19, 2020Updated 5 years ago
- ☆40May 17, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆19Dec 5, 2025Updated 5 months ago
- [CVPR 2025] Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head Generation☆22Dec 18, 2025Updated 4 months ago
- ☆35Nov 26, 2025Updated 5 months ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 4 months ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- ☆18Apr 7, 2025Updated last year
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆23Feb 10, 2025Updated last year
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆263Nov 23, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11Sep 3, 2020Updated 5 years ago
- ☆13Mar 3, 2025Updated last year
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆46Jan 24, 2024Updated 2 years ago
- Code for ACM MM2024 paper: White-box Multimodal Jailbreaks Against Large Vision-Language Models☆32Dec 30, 2024Updated last year
- 可用于无人机个体识别的无人机射频指纹数据集☆32Apr 6, 2025Updated last year
- python RobustRMC projects☆10Apr 22, 2024Updated 2 years ago
- Emoji Attack [ICML 2025]☆42Jul 15, 2025Updated 9 months ago