euanong / image-hijacksView external linksLinks
Official codebase for Image Hijacks: Adversarial Images can Control Generative Models at Runtime
☆54Sep 19, 2023Updated 2 years ago
Alternatives and similar repositories for image-hijacks
Users that are interested in image-hijacks are comparing it to the libraries listed below
Sorting:
- Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Models☆266May 13, 2024Updated last year
- ☆57Jun 5, 2024Updated last year
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆34Oct 23, 2024Updated last year
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆191Jun 26, 2025Updated 7 months ago
- ☆13Jan 14, 2026Updated last month
- ☆55Dec 7, 2024Updated last year
- ☆109Feb 16, 2024Updated last year
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆65Mar 20, 2023Updated 2 years ago
- [NeurIPS-2023] Annual Conference on Neural Information Processing Systems☆227Dec 22, 2024Updated last year
- [ECCV 2024] Official PyTorch Implementation of "How Many Unicorns Are in This Image? A Safety Evaluation Benchmark for Vision LLMs"☆86Nov 28, 2023Updated 2 years ago
- ☆47Jul 14, 2024Updated last year
- Accepted by ECCV 2024☆186Oct 15, 2024Updated last year
- ☆13Mar 9, 2025Updated 11 months ago
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆37Updated this week
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆13Dec 16, 2024Updated last year
- Code for ICLR 2025 Failures to Find Transferable Image Jailbreaks Between Vision-Language Models☆37Jun 1, 2025Updated 8 months ago
- [TMLR 2025] On Memorization in Diffusion Models☆30Oct 5, 2023Updated 2 years ago
- ☆58Aug 11, 2024Updated last year
- Code for Voice Jailbreak Attacks Against GPT-4o.☆36May 31, 2024Updated last year
- Code for ACM MM2024 paper: White-box Multimodal Jailbreaks Against Large Vision-Language Models☆31Dec 30, 2024Updated last year
- Code to conduct an embedding attack on LLMs☆31Jan 10, 2025Updated last year
- One Prompt Word is Enough to Boost Adversarial Robustness for Pre-trained Vision-Language Models☆57Dec 20, 2024Updated last year
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆13Jun 20, 2023Updated 2 years ago
- Official repository for the paper "Gradient-based Jailbreak Images for Multimodal Fusion Models" (https//arxiv.org/abs/2410.03489)☆19Oct 22, 2024Updated last year
- ☆21Mar 20, 2025Updated 10 months ago
- ☆14Jun 6, 2023Updated 2 years ago
- Accepted by IJCAI-24 Survey Track☆231Aug 25, 2024Updated last year
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆26Mar 26, 2025Updated 10 months ago
- Accept by CVPR 2025 (highlight)☆22Jun 8, 2025Updated 8 months ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆20Updated this week
- 😎 up-to-date & curated list of awesome Attacks on Large-Vision-Language-Models papers, methods & resources.☆490Jan 27, 2026Updated 2 weeks ago
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆66Mar 22, 2025Updated 10 months ago
- The official repository of 'Unnatural Language Are Not Bugs but Features for LLMs'☆24May 20, 2025Updated 8 months ago
- Repository for the Paper: Refusing Safe Prompts for Multi-modal Large Language Models☆18Oct 16, 2024Updated last year
- ☆74Jan 21, 2026Updated 3 weeks ago
- [ICLR 2024 Spotlight 🔥 ] - [ Best Paper Award SoCal NLP 2023 🏆] - Jailbreak in pieces: Compositional Adversarial Attacks on Multi-Modal…☆79Jun 6, 2024Updated last year
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19May 23, 2022Updated 3 years ago
- ☆17Sep 4, 2024Updated last year