kay-ck / BSC-AttackView external linksLinks
[AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments
☆25Mar 30, 2024Updated last year
Alternatives and similar repositories for BSC-Attack
Users that are interested in BSC-Attack are comparing it to the libraries listed below
Sorting:
- [ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos☆12Mar 29, 2024Updated last year
- [ACM MM 2024] ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack☆14Dec 20, 2024Updated last year
- [NeurIPS 2024] Lumen: a Large multimodal model with versatile vision-centric capabilities☆25Sep 27, 2024Updated last year
- Adversarial Examples Detection Benchmark☆17Dec 6, 2024Updated last year
- Code and videos accompanying the paper "Flickering Adversarial Attacks against Video Recognition Networks"☆16Dec 8, 2022Updated 3 years ago
- PyTorch implementation of Adversarial Patch☆15Jul 6, 2023Updated 2 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- DeepSAVA: Sparse Adversarial Video Attacks with Spatial Transformations - BMVC 2021 & Neural Networks (2023)☆11Dec 13, 2024Updated last year
- code of paper "Defending Against Alignment-Breaking Attacks via Robustly Aligned LLM"☆14Nov 17, 2023Updated 2 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- EventHallusion: Diagnosing Event Hallucinations in Video LLMs☆34Aug 5, 2025Updated 6 months ago
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆15Feb 12, 2025Updated last year
- ☆62Aug 31, 2021Updated 4 years ago
- ☆16Jul 25, 2022Updated 3 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆21Jan 17, 2025Updated last year
- [MM24 Oral] Identity-Driven Multimedia Forgery Detection via Reference Assistance☆119Jul 27, 2025Updated 6 months ago
- Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks☆46Feb 24, 2022Updated 3 years ago
- ☆24Oct 28, 2024Updated last year
- ☆23Jun 25, 2023Updated 2 years ago
- This is the official repository for the ECCV 2022 paper "RepMix: Representation Mixing for Robust Attribution of Synthesized Images"☆21Jul 22, 2022Updated 3 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- 😎 A curated list of awesome real-world adversarial examples resources☆62Jul 29, 2020Updated 5 years ago
- [CVPR 2024] Official implementation of CVPR 2024 paper: "Doubly Abductive Counterfactual Inference for Text-based Image Editing"☆25Mar 8, 2024Updated last year
- Black-box Adversarial Attacks on Video Recognition Models. (VBAD)☆27Oct 28, 2019Updated 6 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆32Oct 9, 2023Updated 2 years ago
- Open-source red teaming framework for MLLMs with 37+ attack methods☆221Jan 16, 2026Updated last month
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Apr 16, 2023Updated 2 years ago
- A graph based image processing and generation tool.☆14Nov 18, 2025Updated 2 months ago
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆10Apr 21, 2021Updated 4 years ago
- [TIP-2017] Official MATLAB implementation of the "ESIM: Edge Similarity for Screen Content Image Quality Assessment"☆11Jul 8, 2025Updated 7 months ago
- Pytorch version of IEEE Transactions on Multimedia 2019: "Naturalness-Aware Deep No-Reference Image Quality Assessment."☆12Jun 30, 2020Updated 5 years ago
- It is the official code of the AAAI-24 paper "Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain"☆17Oct 11, 2025Updated 4 months ago
- Training pretrained deep neural network, Xception Net, with Face Forensics ++ Dataset, and implement two different losses to learn image …☆10Apr 29, 2020Updated 5 years ago
- ☆46Apr 10, 2023Updated 2 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago