[CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks
β31Jun 12, 2025Updated 9 months ago
Alternatives and similar repositories for Chain_of_Attack
Users that are interested in Chain_of_Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacksβ15Feb 12, 2025Updated last year
- π‘οΈ[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attackβ61Apr 7, 2024Updated last year
- β48Apr 7, 2025Updated 11 months ago
- [ICML 2025] X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIPβ42Feb 3, 2026Updated last month
- SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editingβ13Apr 21, 2024Updated last year
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [ECCV 2024] "REVISION: Rendering Tools Enable Spatial Fidelity in Vision-Language Models"β13Aug 6, 2024Updated last year
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.β15Dec 19, 2025Updated 3 months ago
- Code for the CVPR 2023 paper "Proximal Splitting Adversarial Attacks for Semantic Segmentation"β23Apr 30, 2024Updated last year
- [MICCAI 2025] Hierarchical Self-Supervised Adversarial Training for Robust Vision Models in Histopathologyβ12Jun 17, 2025Updated 9 months ago
- The official code for paper "Stacking Brick by Brick: Aligned Feature Isolation for Incremental Face Forgery Detection" (CVPR 2025)β26Aug 15, 2025Updated 7 months ago
- [NeurIPS25 & ICML25 Workshop on Reliable and Responsible Foundation Models] A Simple Baseline Achieving Over 90% Success Rate Against theβ¦β90Feb 3, 2026Updated last month
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.β12Jun 20, 2023Updated 2 years ago
- [ECCVW 2024 -- ORAL] Official repository of paper titled "Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors".β12Oct 11, 2024Updated last year
- β16Jul 25, 2022Updated 3 years ago
- Open source password manager - Proton Pass β’ AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)β45Jan 24, 2024Updated 2 years ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacksβ38Apr 23, 2025Updated 11 months ago
- ManiCLIP: Multi-Attribute Face Manipulation from Textβ24Nov 6, 2023Updated 2 years ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)β19Jul 22, 2023Updated 2 years ago
- β21Mar 18, 2026Updated last week
- β12Nov 4, 2024Updated last year
- Official repo for [CVPR2025 Oral] Black-Box Forgery Attacks on Semantic Watermarks for Diffusion Modelsβ34Nov 19, 2025Updated 4 months ago
- [ICCV-2025] Universal Adversarial Attack, Multimodal Adversarial Attacks, VLP models, Contrastive Learning, Cross-modal Perturbation Geneβ¦β37Jul 10, 2025Updated 8 months ago
- β63Aug 31, 2021Updated 4 years ago
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- [CVPR 2023] Official repository of paper titled "CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent β¦β102Mar 25, 2024Updated 2 years ago
- β24Jul 25, 2024Updated last year
- Code for our CVPR 2023 paper: Black-Box Sparse Adversarial Attack via Multi-Objective Optimisationβ29Jul 9, 2024Updated last year
- [CVPR2025] Official Repository for IMMUNE: Improving Safety Against Jailbreaks in Multi-modal LLMs via Inference-Time Alignmentβ27Jun 11, 2025Updated 9 months ago
- Adversarial Attacks against Closed-Source MLLMs via Feature Optimal Alignment (NeurIPS 2025)β52Nov 5, 2025Updated 4 months ago
- The PyTorch implementation for "DEAL: Disentangle and Localize Concept-level Explanations for VLMs" (ECCV 2024 Strong Double Blind)β20Mar 9, 2026Updated 2 weeks ago
- β14Jun 19, 2024Updated last year
- [CVPRW 2025] Official repository of paper titled "Towards Evaluating the Robustness of Visual State Space Models"β26Jun 8, 2025Updated 9 months ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", β¦β75Dec 6, 2022Updated 3 years ago
- NordVPN Threat Protection Proβ’ β’ AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognitionβ41May 30, 2023Updated 2 years ago
- SmallCap: Lightweight Image Captioning Prompted with Retrieval Augmentationβ127Feb 13, 2024Updated 2 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorchβ20Oct 9, 2020Updated 5 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"β86Jun 9, 2022Updated 3 years ago
- A repository to mass generate deepfake video based on DeepFaceLab repository.β10Aug 10, 2023Updated 2 years ago
- GPU accelerated Perlin Noise in pythonβ11Oct 23, 2020Updated 5 years ago
- Implementation for the works "VecGAN: Image-to-Image Translation with Interpretable Latent Directions" (ECCV 2022) and "Face Attribute Edβ¦β52Oct 16, 2023Updated 2 years ago