ECCV2024: Adversarial Prompt Tuning for Vision-Language Models
☆31Mar 7, 2026Updated last month
Alternatives and similar repositories for Adversarial-Prompt-Tuning
Users that are interested in Adversarial-Prompt-Tuning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- One Prompt Word is Enough to Boost Adversarial Robustness for Pre-trained Vision-Language Models☆59Dec 20, 2024Updated last year
- Code repository for CVPR2024 paper 《Pre-trained Model Guided Fine-Tuning for Zero-Shot Adversarial Robustness》☆25May 29, 2024Updated last year
- ☆27Feb 19, 2025Updated last year
- Auto1111 port of NVlab's adversarial purification method that uses the forward and reverse processes of diffusion models to remove advers…☆13Aug 8, 2023Updated 2 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated last year
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- PDM-based Purifier☆22Nov 5, 2024Updated last year
- This repository lists some awesome public projects about Zero-shot/Few-shot Learning based on CLIP (Contrastive Language-Image Pre-Traini…☆29Nov 28, 2024Updated last year
- [ICLR 2025] BlueSuffix: Reinforced Blue Teaming for Vision-Language Models Against Jailbreak Attacks☆31Nov 2, 2025Updated 5 months ago
- ☆11Jan 25, 2022Updated 4 years ago
- this is for the ACM MM paper---Backdoor Attack on Crowd Counting☆17Jul 10, 2022Updated 3 years ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆67Mar 20, 2023Updated 3 years ago
- This is the official implementation of the paper titled "Comprehensive Comparison of Vision Transformers and Traditional Convolutional Ne…☆13Mar 4, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- (TPAMI 2026) Complementary Text-Guided Attention for Zero-Shot Adversarial Robustness & & (NeurIPS 2024) Text-Guided Attention is All Y…☆19Mar 23, 2026Updated 2 weeks ago
- ☆38Oct 11, 2022Updated 3 years ago
- ☆37Jul 3, 2024Updated last year
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆66Mar 22, 2025Updated last year
- ☆11Mar 24, 2023Updated 3 years ago
- ☆46Jun 11, 2023Updated 2 years ago
- [ICML 2024] Unsupervised Adversarial Fine-Tuning of Vision Embeddings for Robust Large Vision-Language Models☆158Feb 19, 2026Updated last month
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- ☆55Apr 19, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆337Jan 29, 2023Updated 3 years ago
- ☆16Jun 5, 2024Updated last year
- ☆109Feb 16, 2024Updated 2 years ago
- Research Paper - Automated Labelling of Coronary Vessels via Neural Network☆10Oct 12, 2020Updated 5 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Mar 25, 2023Updated 3 years ago
- Denoising Masked Autoencoders Help Robust Classification.☆67Jun 4, 2023Updated 2 years ago
- [ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos☆12Mar 29, 2024Updated 2 years ago
- [NDSS 2026] Official repo for Odysseus: Jailbreaking Commercial Multimodal LLM-integrated Systems via Dual Steganography☆32Mar 14, 2026Updated 3 weeks ago
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆24Mar 23, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆262Nov 23, 2025Updated 4 months ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆38Apr 23, 2025Updated 11 months ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Dec 9, 2024Updated last year
- ☆53Dec 4, 2024Updated last year
- Safe-CLIP: Removing NSFW Concepts from Vision-and-Language Models. ECCV 2024☆67Aug 10, 2024Updated last year