WUSTL-CSPL / RIATIG
☆23Updated last year
Alternatives and similar repositories for RIATIG:
Users that are interested in RIATIG are comparing it to the libraries listed below
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆18Updated 10 months ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆26Updated 5 months ago
- ☆64Updated 6 months ago
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆26Updated last month
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆54Updated last year
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆44Updated 3 months ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆18Updated 5 months ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆21Updated last year
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆85Updated 5 months ago
- Code repository for CVPR2024 paper 《Pre-trained Model Guided Fine-Tuning for Zero-Shot Adversarial Robustness》☆20Updated 8 months ago
- Code Repo for the NeurIPS 2023 paper "VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models"☆22Updated 5 months ago
- This is an official repository for Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study (ICCV2023…☆22Updated last year
- ☆29Updated 4 months ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆53Updated 10 months ago
- ☆18Updated 2 years ago
- ☆29Updated 7 months ago
- ☆20Updated 5 months ago
- ☆18Updated 9 months ago
- A curated list of papers for the transferability of adversarial examples☆60Updated 7 months ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆46Updated 10 months ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆16Updated last year
- ☆24Updated 6 months ago
- ☆13Updated 9 months ago
- ☆40Updated 6 months ago
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆32Updated 5 months ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆56Updated last month
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆17Updated last year
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆96Updated last year