Trustworthy-AI-Group / Adversarial_Examples_Papers
A list of recent papers about adversarial learning
☆141Updated this week
Alternatives and similar repositories for Adversarial_Examples_Papers:
Users that are interested in Adversarial_Examples_Papers are comparing it to the libraries listed below
- Revisiting Transferable Adversarial Images (arXiv)☆123Updated last month
- A curated list of papers for the transferability of adversarial examples☆65Updated 9 months ago
- ☆94Updated last year
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆134Updated 2 months ago
- BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models☆134Updated 2 months ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆94Updated 2 years ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆201Updated last year
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆33Updated last year
- ☆103Updated last year
- Composite Backdoor Attacks Against Large Language Models☆13Updated last year
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆124Updated 5 months ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆89Updated 7 months ago
- A Survey on Jailbreak Attacks and Defenses against Multimodal Generative Models☆170Updated this week
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆53Updated last month
- ☆81Updated 3 years ago
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆71Updated 2 years ago
- ☆35Updated 2 years ago
- A paper list for localized adversarial patch research☆147Updated last year
- ☆70Updated 9 months ago
- Code for ACM MM2024 paper: White-box Multimodal Jailbreaks Against Large Vision-Language Models☆24Updated 3 months ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆18Updated 2 months ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆26Updated 7 months ago
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆56Updated 4 months ago
- ☆51Updated 3 months ago
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆24Updated 5 months ago
- ☆35Updated 3 years ago
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆27Updated last year
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆26Updated 2 years ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated last year
- A list of recent adversarial attack and defense papers (including those on large language models)☆37Updated this week