WindVChen / DiffAttackLinks
An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.
☆236Updated last year
Alternatives and similar repositories for DiffAttack
Users that are interested in DiffAttack are comparing it to the libraries listed below
Sorting:
- ☆41Updated last year
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆110Updated last year
- ☆78Updated last year
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆41Updated 2 years ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆112Updated last year
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆28Updated 3 months ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Updated 2 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆111Updated 3 years ago
- ☆40Updated 6 months ago
- Official codes for FPR (Accepted by CVPR2025)☆11Updated 7 months ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Updated last year
- ☆59Updated 2 years ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆65Updated 2 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆400Updated last month
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆64Updated 2 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆31Updated last year
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Updated 2 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆92Updated 2 years ago
- A curated list of papers for the transferability of adversarial examples☆74Updated last year
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆77Updated 7 months ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆55Updated 2 months ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆132Updated last month
- Official implementation of Segmentation and Complete (SAC) defense.☆24Updated last year
- ☆16Updated 3 months ago
- ☆37Updated last year
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41Updated 2 years ago
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆314Updated 2 years ago
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆32Updated 2 months ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆37Updated last year
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆39Updated 2 years ago