Awesome-Adversarial-Attack-Methods-Summary
☆12Jul 24, 2024Updated last year
Alternatives and similar repositories for Adversarial-Attack-Methods-Summary
Users that are interested in Adversarial-Attack-Methods-Summary are comparing it to the libraries listed below
Sorting:
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Universal Adversarial Perturbations for Vision-Language Pre-trained Models☆24Aug 8, 2025Updated 6 months ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆26Aug 27, 2024Updated last year
- Code for the AAAI 2024 paper: "AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack" (accepted).☆12Mar 28, 2024Updated last year
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- A list of recent adversarial attack and defense papers (including those on large language models)☆45Jan 25, 2026Updated last month
- 宝可梦3代GBA汉字字库补丁(增益优化版)☆12Jul 15, 2024Updated last year
- Dataset for GAN-Generated Images Detection☆10Apr 25, 2024Updated last year
- 可用于《宝可梦》第四世代汉化修正版的 PKHeX 版本☆12Jul 19, 2025Updated 7 months ago
- This is my master's thesis , it research about watermarking based on DWT frequency domain☆10May 9, 2018Updated 7 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- ☆12Jul 16, 2025Updated 7 months ago
- ☆10Mar 24, 2022Updated 3 years ago
- ☆13Jan 14, 2026Updated last month
- ☆10Jun 5, 2021Updated 4 years ago
- nocaps: novel object captioning at scale☆10May 23, 2019Updated 6 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Aug 9, 2019Updated 6 years ago
- Paper sharing in adversary related works☆46Aug 14, 2025Updated 6 months ago
- ☆13Apr 5, 2020Updated 5 years ago
- PokeClassic is a romhack inspired by Pokemon Yellow, using the Pokemon Emerald Engine. This romhack was originally made by danenders. Thi…☆19Updated this week
- ☆16Aug 13, 2024Updated last year
- Demo code for the paper: One Thing to Fool them All: Generating Interpretable, Universal, and Physically-Realizable Adversarial Features☆12Nov 30, 2023Updated 2 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- AdvT-shirt-1K A Physical-world Adversarial T-shirt Dataset for Adversarial Robustness Evaluation☆14Aug 7, 2025Updated 6 months ago
- ☆12Sep 10, 2024Updated last year
- Using Canny edge detector, Hough transform and RANSAC to locate the vanishing point in images☆11Jan 1, 2022Updated 4 years ago
- ☆14May 8, 2024Updated last year
- ☆15Feb 26, 2023Updated 3 years ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- ☆15Dec 19, 2022Updated 3 years ago
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Oct 12, 2024Updated last year
- ☆14Jun 22, 2022Updated 3 years ago
- The official repository for CosPGD: a unified white-box adversarial attack for pixel-wise prediction tasks.☆15May 8, 2025Updated 9 months ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Aug 3, 2022Updated 3 years ago