[ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos
☆12Mar 29, 2024Updated last year
Alternatives and similar repositories for GCMA
Users that are interested in GCMA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ACM MM 2024] ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack☆14Dec 20, 2024Updated last year
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated last year
- [NeurIPS 2024] Lumen: a Large multimodal model with versatile vision-centric capabilities☆25Sep 27, 2024Updated last year
- Cross-Modal Transferable Adversarial Attacks from Images to Videos (CVPR 2022)☆21Jul 3, 2024Updated last year
- Adversarial Examples Detection Benchmark☆17Dec 6, 2024Updated last year
- [CVPRW 2025] UniToken is an auto-regressive generation model that combines discrete and continuous representations to process visual inpu…☆106Apr 23, 2025Updated 11 months ago
- [ECCV 2022] MORE: Multi-Order RElation Mining for Dense Captioning in 3D Scenes official implementation☆16Feb 2, 2023Updated 3 years ago
- EventHallusion: Diagnosing Event Hallucinations in Video LLMs☆34Aug 5, 2025Updated 7 months ago
- ☆21Jan 17, 2025Updated last year
- Emoji Attack [ICML 2025]☆41Jul 15, 2025Updated 8 months ago
- [MM24 Oral] Identity-Driven Multimedia Forgery Detection via Reference Assistance☆118Jul 27, 2025Updated 7 months ago
- Open-source red teaming framework for MLLMs with 42+ attack methods☆233Mar 16, 2026Updated last week
- ☆17Sep 23, 2022Updated 3 years ago
- [ECCV 2024] Reliable and Efficient Concept Erasure of Text-to-Image Diffusion Models☆87Oct 29, 2024Updated last year
- 黑马程序员<tlias智能学习辅助系统(JavaWeb入门)>项目练习☆14Jan 21, 2024Updated 2 years ago
- ☆24Oct 28, 2024Updated last year
- [CVPR 2024] Official implementation of CVPR 2024 paper: "Doubly Abductive Counterfactual Inference for Text-based Image Editing"☆25Mar 8, 2024Updated 2 years ago
- ☆11Mar 24, 2023Updated 3 years ago
- 这是应广大群友需求开的照片集☆13Jan 7, 2022Updated 4 years ago
- ☆13Aug 26, 2024Updated last year
- The official implementation of "PixelThink: Towards Efficient Chain-of-Pixel Reasoning" (arXiv 2025)☆41May 30, 2025Updated 9 months ago
- ☆10Mar 4, 2024Updated 2 years ago
- Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020)☆10Jan 5, 2022Updated 4 years ago
- ☆37Jul 3, 2024Updated last year
- To monitor gait patterns to detect freezing of gait. Done as part of the Singapore Science Mentorship Programme + CS4131 module + extende…☆21Nov 24, 2021Updated 4 years ago
- ☆19Jan 6, 2022Updated 4 years ago
- ☆11Dec 15, 2024Updated last year
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆13Feb 28, 2024Updated 2 years ago
- ☆14Jan 4, 2023Updated 3 years ago
- ☆14Dec 18, 2024Updated last year
- Official PyTorch Implementation for G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors (TIFS-2024)☆17Aug 27, 2024Updated last year
- ☆21Sep 23, 2025Updated 6 months ago
- The evaluation code for A Safety Report on GPT-5.2, Gemini 3 Pro, Qwen3-VL, Grok 4.1 Fast, Nano Banana Pro, and Seedream 4.5☆53Jan 18, 2026Updated 2 months ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆21Nov 25, 2020Updated 5 years ago
- The implementation of our NeurIPS 2024 paper "DarkSAM: Fooling Segment Anything Model to Segment Nothing".☆13Nov 4, 2024Updated last year
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- MM-Diff: High-Fidelity Image Personalization via Multi-Modal Condition Integration☆27May 30, 2024Updated last year
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago