[AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"
☆60Aug 17, 2024Updated last year
Alternatives and similar repositories for Adv-Diffusion
Users that are interested in Adv-Diffusion are comparing it to the libraries listed below
Sorting:
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆55Oct 14, 2024Updated last year
- ☆44Oct 9, 2024Updated last year
- ☆35Sep 6, 2025Updated 6 months ago
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆45Jan 24, 2024Updated 2 years ago
- We propose a statistical consistency attack (StatAttack) against diverse DeepFake detectors.☆18Aug 16, 2023Updated 2 years ago
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆15Feb 12, 2025Updated last year
- [CVPR'25] CO-SPY: Combining Semantic and Pixel Features to Detect Synthetic Images by AI☆40Jan 8, 2026Updated 2 months ago
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago
- [CIKM-2024] Official code for work "ERASE: Error-Resilient Representation Learning on Graphs for Label Noise Tolerance"☆19Aug 14, 2024Updated last year
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆26Feb 14, 2024Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆118Oct 31, 2023Updated 2 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆39Feb 29, 2024Updated 2 years ago
- ☆17Dec 5, 2025Updated 3 months ago
- [ICCV 2023 Oral] Official implementation of "Robust Evaluation of Diffusion-Based Adversarial Purification"☆25Dec 3, 2023Updated 2 years ago
- [CVPR 2023] Official repository of paper titled "CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent …☆102Mar 25, 2024Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆61Apr 7, 2024Updated last year
- [IJCV 2024] Towards Unified Defense for Face Forgery and Spoofing Attacks via Dual Space Reconstruction Learning☆20Nov 4, 2025Updated 4 months ago
- ☆17Dec 7, 2023Updated 2 years ago
- A package that achieves 95%+ transfer attack success rate against GPT-4☆26Oct 24, 2024Updated last year
- The code of the ICLR 2024 paper: Adversarial Training on Purification (AToP): Advancing Both Robustness and Generalization☆10Nov 21, 2024Updated last year
- ☆10Jun 11, 2025Updated 9 months ago
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆13Feb 28, 2024Updated 2 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆31Jun 12, 2025Updated 9 months ago
- A Fairness Benchmark for Face Forgery Detection☆12Apr 12, 2025Updated 11 months ago
- ☆21Sep 23, 2025Updated 5 months ago
- A modular framework designed for easy experimentation with optimization-based diffusion sampling algorithms.☆17Apr 9, 2025Updated 11 months ago
- ☆16Dec 18, 2023Updated 2 years ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- Official implementation of "Prompt-Agnostic Adversarial Perturbation for Customized Diffusion Models"☆25May 30, 2025Updated 9 months ago
- AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks☆19May 12, 2025Updated 10 months ago