[NeurIPS 2023] Content-based Unrestricted Adversarial Attack
☆31Jul 21, 2025Updated 7 months ago
Alternatives and similar repositories for Adversarial_Content_Attack
Users that are interested in Adversarial_Content_Attack are comparing it to the libraries listed below
Sorting:
- AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models☆20Nov 8, 2025Updated 3 months ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆256Nov 23, 2025Updated 3 months ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆116Oct 31, 2023Updated 2 years ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆44Oct 12, 2023Updated 2 years ago
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- ☆14Oct 6, 2024Updated last year
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- AdvT-shirt-1K A Physical-world Adversarial T-shirt Dataset for Adversarial Robustness Evaluation☆14Aug 7, 2025Updated 6 months ago
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆15Feb 12, 2025Updated last year
- ☆21Jul 25, 2025Updated 7 months ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆39Feb 29, 2024Updated 2 years ago
- (AAAI 2024) Transferable Adversarial Attacks for Object Detection using Object-Aware Significant Feature Distortion☆16Dec 13, 2023Updated 2 years ago
- ☆19Apr 27, 2022Updated 3 years ago
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆43May 18, 2025Updated 9 months ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆38Apr 23, 2025Updated 10 months ago
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆34May 23, 2024Updated last year
- ☆40Jan 7, 2023Updated 3 years ago
- [ICCV 2023] Code for "Distracting Downpour: Adversarial Weather Attacks for Motion Estimation"☆18Aug 17, 2023Updated 2 years ago
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆29Jun 12, 2025Updated 8 months ago
- ☆16Jul 25, 2022Updated 3 years ago
- ☆48Apr 7, 2025Updated 10 months ago
- ☆49Jun 19, 2024Updated last year
- ☆17Dec 5, 2025Updated 3 months ago
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Sep 9, 2024Updated last year
- [NeurIPS 2022] GAMA: Generative Adversarial Multi-Object Scene Attacks☆19Sep 5, 2023Updated 2 years ago
- Official implementation of "Prompt-Agnostic Adversarial Perturbation for Customized Diffusion Models"☆25May 30, 2025Updated 9 months ago
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- Code for Transferable Unlearnable Examples☆22Mar 11, 2023Updated 2 years ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆55Oct 14, 2024Updated last year
- ☆23Jun 25, 2023Updated 2 years ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆116Oct 11, 2024Updated last year
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- ☆37Sep 14, 2024Updated last year
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆445Jan 16, 2026Updated last month
- ☆80Jul 23, 2024Updated last year
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago