NY1024 / BAP-Jailbreak-Vision-Language-Models-via-Bi-Modal-Adversarial-Prompt
☆20Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for BAP-Jailbreak-Vision-Language-Models-via-Bi-Modal-Adversarial-Prompt
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆13Updated 2 weeks ago
- ☆30Updated 4 months ago
- Code for Arxiv When Do Universal Image Jailbreaks Transfer Between Vision-Language Models?☆15Updated last month
- ☆24Updated 3 months ago
- ☆37Updated 2 months ago
- [ICLR 2024 Spotlight 🔥 ] - [ Best Paper Award SoCal NLP 2023 🏆] - Jailbreak in pieces: Compositional Adversarial Attacks on Multi-Modal…☆24Updated 5 months ago
- AnyDoor: Test-Time Backdoor Attacks on Multimodal Large Language Models☆43Updated 7 months ago
- ☆18Updated this week
- Official codebase for Image Hijacks: Adversarial Images can Control Generative Models at Runtime☆37Updated last year
- One Prompt Word is Enough to Boost Adversarial Robustness for Pre-trained Vision-Language Models☆37Updated 5 months ago
- ☆15Updated 2 months ago
- [ICML 2024] Safety Fine-Tuning at (Almost) No Cost: A Baseline for Vision Large Language Models.☆44Updated 2 months ago
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆17Updated 7 months ago
- ☆38Updated last year
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆22Updated 9 months ago
- Code for Neurips 2024 paper "Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models"☆27Updated last month
- Improved techniques for optimization-based jailbreaking on large language models☆42Updated 5 months ago
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆39Updated last week
- ☆53Updated last year
- ☆12Updated 2 years ago
- ☆16Updated 5 months ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆47Updated last year
- JailBreakV-28K: A comprehensive benchmark designed to evaluate the transferability of LLM jailbreak attacks to MLLMs, and further assess …☆35Updated 3 months ago
- Accepted by ECCV 2024☆71Updated 3 weeks ago
- ☆9Updated last year
- [ECCV 2024] Official PyTorch Implementation of "How Many Unicorns Are in This Image? A Safety Evaluation Benchmark for Vision LLMs"☆66Updated 11 months ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆22Updated 2 months ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆15Updated 2 months ago
- ☆13Updated 4 months ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆28Updated 10 months ago