WindVChen / DiffAttackLinks
An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.
☆232Updated 11 months ago
Alternatives and similar repositories for DiffAttack
Users that are interested in DiffAttack are comparing it to the libraries listed below
Sorting:
- ☆41Updated 11 months ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆110Updated last year
- ☆78Updated last year
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆28Updated 2 months ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆112Updated 11 months ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆41Updated last year
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆111Updated 3 years ago
- Official codes for FPR (Accepted by CVPR2025)☆11Updated 6 months ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41Updated 2 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆130Updated 3 weeks ago
- ☆39Updated 6 months ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Updated last year
- ☆59Updated 2 years ago
- ☆26Updated last year
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆397Updated last week
- ☆37Updated last year
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆73Updated 6 months ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Updated 2 years ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆63Updated 2 years ago
- A curated list of papers for the transferability of adversarial examples☆72Updated last year
- Official implementation of Segmentation and Complete (SAC) defense.☆24Updated last year
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆91Updated 2 years ago
- ☆15Updated 2 months ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆51Updated 2 months ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆31Updated last year
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆28Updated 10 months ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆64Updated 2 years ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆26Updated last year
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆144Updated 2 years ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆39Updated 2 years ago