A package that achieves 95%+ transfer attack success rate against GPT-4
☆26Oct 24, 2024Updated last year
Alternatives and similar repositories for VLMTransfer
Users that are interested in VLMTransfer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for ICLR 2025 Failures to Find Transferable Image Jailbreaks Between Vision-Language Models☆36Jun 1, 2025Updated 11 months ago
- Respect to the input tensor instead of paramters of NN☆21Jul 18, 2022Updated 3 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- [ICLR 2024 Spotlight 🔥 ] - [ Best Paper Award SoCal NLP 2023 🏆] - Jailbreak in pieces: Compositional Adversarial Attacks on Multi-Modal…☆81Jun 6, 2024Updated last year
- ☆56Dec 7, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- Official repository for "Boosting Adversarial Transferability using Dynamic Cues " (ICLR 2023)☆20Aug 24, 2023Updated 2 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- [ICLR 2025] Dissecting adversarial robustness of multimodal language model agents☆138Feb 19, 2025Updated last year
- Official PyTorch implementation of "MM-PoisonRAG: Disrupting Multimodal RAG with Local and Global Poisoning Attacks"☆13Dec 4, 2025Updated 5 months ago
- ☆25Jan 17, 2025Updated last year
- [ECCV 2022: Oral] In this work, we discover that color is a crtical transferable forensic feature (T-FF) in universal detectors for detec…☆16Jan 25, 2023Updated 3 years ago
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆63Apr 7, 2024Updated 2 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆117Jul 21, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated last year
- [NeurIPS 2024] "Membership Inference on Text-to-image Diffusion Models via Conditional Likelihood Discrepancy"☆12Sep 15, 2025Updated 7 months ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆72Aug 7, 2025Updated 9 months ago
- Data-Independent Operator: A Training-Free Artifact Representation Extractor for Generalizable Deepfake Detection☆18Mar 19, 2024Updated 2 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆95Dec 1, 2022Updated 3 years ago
- ☆14Jun 6, 2023Updated 2 years ago
- Multi-dimensional analysis of orthogonal safety directions in LLM alignment☆22Mar 20, 2025Updated last year
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆467Feb 27, 2026Updated 2 months ago
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆46Jan 24, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆20Jan 13, 2024Updated 2 years ago
- [ACL 2025] The official code for "AGrail: A Lifelong Agent Guardrail with Effective and Adaptive Safety Detection".☆40Aug 4, 2025Updated 9 months ago
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆31Nov 15, 2025Updated 5 months ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆263Nov 23, 2025Updated 5 months ago
- This is the code repository for "Uncovering Safety Risks of Large Language Models through Concept Activation Vector"☆48Oct 13, 2025Updated 6 months ago
- We propose a statistical consistency attack (StatAttack) against diverse DeepFake detectors.☆18Aug 16, 2023Updated 2 years ago
- Repository for the Paper: Leave My Images Alone: Preventing Multi-Modal Large Language Models from Analyzing Images via Visual Prompt Inj…☆19Apr 17, 2026Updated 2 weeks ago
- ☆23Dec 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them [NeurIPS 2020]☆35Jul 3, 2021Updated 4 years ago
- ☆20Oct 5, 2023Updated 2 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- ☆81Jul 23, 2024Updated last year
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆40Oct 17, 2024Updated last year