jiaxiaojunQAQ / FGSM-LAW
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)
☆34Updated 9 months ago
Alternatives and similar repositories for FGSM-LAW:
Users that are interested in FGSM-LAW are comparing it to the libraries listed below
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆41Updated 11 months ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack☆33Updated 4 months ago
- [NeurIPS 2024] GuardT2I: Defending Text-to-Image Models from Adversarial Prompts☆20Updated 4 months ago
- [NDSS'24] Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time☆56Updated 6 months ago
- ☆35Updated 2 months ago
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆129Updated last week
- ☆110Updated 3 weeks ago
- ☆19Updated 3 weeks ago
- A comprehensive collection of resources focused on addressing and understanding hallucination phenomena in MLLMs.☆34Updated 10 months ago
- Improved techniques for optimization-based jailbreaking on large language models (ICLR2025)☆93Updated 2 months ago
- Deep Learning - Robustness - Immune System☆14Updated 3 years ago
- Practical Detection of Trojan Neural Networks☆119Updated 4 years ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆48Updated 3 years ago
- ☆73Updated last month
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆27Updated 8 months ago
- [ICML22] "Revisiting and Advancing Fast Adversarial Training through the Lens of Bi-level Optimization" by Yihua Zhang*, Guanhua Zhang*, …☆65Updated 2 years ago
- CVPR 2022 Workshop Robust Classification☆78Updated 2 years ago
- [ICLR 2025] Improving Data Efficiency via Curating LLM-Driven Rating Systems☆49Updated last week
- To provide the stego community with C/C++ implementations of selected feature extractors mainly targeted at H.264 steganography.☆72Updated 3 years ago
- [ICLR 2023] Official Tensorflow implementation of "Distributionally Robust Post-hoc Classifiers under Prior Shifts"☆34Updated last year
- ☆78Updated 3 months ago
- ASK-Attack and ASK-Defense☆43Updated 2 years ago
- This project help you understand the concepts of histogram equalization and histogram specification in image processing learning from a p…☆9Updated last year
- A demo project to demonstrate how DES encryption/decryption works.☆13Updated 2 years ago
- [CVPR2024] MMA-Diffusion: MultiModal Attack on Diffusion Models☆156Updated 11 months ago
- ☆58Updated last year
- [TMM-2022] Intra-class Adaptive Augmentation with Neighbor Correction for Deep Metric Learning, IEEE Transactions on Multimedia (T-MM), 2…☆29Updated last year
- This is the public code repository for the paper 'Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage …☆9Updated 2 months ago
- PyTorch Implementation of ECCV 2022 paper: "DuelGAN: A Duel Between Two Discriminators Stabilizes the GAN Training".☆39Updated 2 years ago
- ☆31Updated 6 months ago