[AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"
☆61Aug 17, 2024Updated last year
Alternatives and similar repositories for Adv-Diffusion
Users that are interested in Adv-Diffusion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆56Oct 14, 2024Updated last year
- ☆43Oct 9, 2024Updated last year
- ☆38Sep 14, 2024Updated last year
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆46Jan 24, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 3 years ago
- ☆47Apr 7, 2025Updated last year
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆44Aug 12, 2023Updated 2 years ago
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆17Feb 12, 2025Updated last year
- [CIKM-2024] Official code for work "ERASE: Error-Resilient Representation Learning on Graphs for Label Noise Tolerance"☆19Aug 14, 2024Updated last year
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- ☆25Feb 14, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated 2 years ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41May 30, 2023Updated 2 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆41Feb 29, 2024Updated 2 years ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆119Oct 31, 2023Updated 2 years ago
- (2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition☆10Apr 3, 2026Updated last month
- [ICCV 2023 Oral] Official implementation of "Robust Evaluation of Diffusion-Based Adversarial Purification"☆25Dec 3, 2023Updated 2 years ago
- [CVPR 2023] Official repository of paper titled "CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent …☆103Mar 25, 2024Updated 2 years ago
- [IJCV 2024] Towards Unified Defense for Face Forgery and Spoofing Attacks via Dual Space Reconstruction Learning☆21Nov 4, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆17Dec 7, 2023Updated 2 years ago
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆340Jan 29, 2023Updated 3 years ago
- Official PyTorch Implementation for G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors (TIFS-2024)☆17Aug 27, 2024Updated last year
- A package that achieves 95%+ transfer attack success rate against GPT-4☆26Oct 24, 2024Updated last year
- The code of the ICLR 2024 paper: Adversarial Training on Purification (AToP): Advancing Both Robustness and Generalization☆10Nov 21, 2024Updated last year
- ☆10Jun 11, 2025Updated 11 months ago
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- ☆63Aug 31, 2021Updated 4 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆22Dec 12, 2022Updated 3 years ago
- [CVPR'25]Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks☆31Jun 12, 2025Updated 11 months ago
- A Fairness Benchmark for Face Forgery Detection☆12Apr 12, 2025Updated last year
- A modular framework designed for easy experimentation with optimization-based diffusion sampling algorithms.☆17May 13, 2026Updated last week
- ☆16Dec 18, 2023Updated 2 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- Official repository of the paper: IDiff-Face: Synthetic-based Face Recognition through Fizzy Identity-conditioned Diffusion Models (ICCV …☆95Apr 3, 2024Updated 2 years ago