WindVChen / DiffAttackLinks
An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.
☆221Updated 10 months ago
Alternatives and similar repositories for DiffAttack
Users that are interested in DiffAttack are comparing it to the libraries listed below
Sorting:
- ☆38Updated 10 months ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆108Updated last year
- ☆76Updated last year
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆27Updated last month
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆110Updated 3 years ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆18Updated 2 years ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆111Updated 10 months ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆73Updated 5 months ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Updated last year
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆31Updated last year
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆39Updated last year
- Official codes for FPR (Accepted by CVPR2025)☆11Updated 5 months ago
- ☆25Updated 11 months ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41Updated 2 years ago
- ☆60Updated 2 years ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆64Updated last year
- ☆35Updated 4 months ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆34Updated last year
- ☆35Updated last year
- Revisiting Transferable Adversarial Images (arXiv)☆126Updated 5 months ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆90Updated 2 years ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆62Updated 2 years ago
- A curated list of papers for the transferability of adversarial examples☆73Updated last year
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆18Updated 2 years ago
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆21Updated last year
- ☆58Updated 2 years ago
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆116Updated 3 years ago
- Official code implement of Robust Classification via a Single Diffusion Model☆90Updated 5 months ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆43Updated last year
- Official implementation of Segmentation and Complete (SAC) defense.☆24Updated last year