liuaishan / SpatiotemporalAttackView external linksLinks
☆13Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for SpatiotemporalAttack
Users that are interested in SpatiotemporalAttack are comparing it to the libraries listed below
Sorting:
- ☆12Sep 22, 2023Updated 2 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- Repository for Offline Visual Representation Learning v1 and v2☆13Jan 24, 2023Updated 3 years ago
- ☆12Mar 29, 2021Updated 4 years ago
- Official repository for the paper "Gradient-based Jailbreak Images for Multimodal Fusion Models" (https//arxiv.org/abs/2410.03489)☆19Oct 22, 2024Updated last year
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆40Aug 6, 2024Updated last year
- ☆17Nov 15, 2021Updated 4 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 2 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Code repository for the paper "Heuristic Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models"☆15Aug 7, 2025Updated 6 months ago
- ☆25Nov 4, 2024Updated last year
- A Paperlist of Adversarial Attack on Object Detection☆125Mar 16, 2023Updated 2 years ago
- ☆21Jul 16, 2019Updated 6 years ago
- Adversarial Attacks against Closed-Source MLLMs via Feature Optimal Alignment (NeurIPS 2025)☆46Nov 5, 2025Updated 3 months ago
- VELMA agent for VLN in Street View☆29Sep 29, 2023Updated 2 years ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆34Oct 23, 2024Updated last year
- ☆67Jun 2, 2022Updated 3 years ago
- Code to conduct an embedding attack on LLMs☆31Jan 10, 2025Updated last year
- ☆28Sep 22, 2022Updated 3 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Aug 17, 2023Updated 2 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 3 years ago
- ☆14Apr 8, 2024Updated last year
- Boosting the Class-Incremental Learning in 3D Point Clouds via Zero-Collection-Cost Basic Shape Pre-Training☆12Nov 30, 2024Updated last year
- A Framework for Evaluating AI Agent Safety in Realistic Environments☆30Oct 2, 2025Updated 4 months ago
- ☆13Mar 13, 2023Updated 2 years ago
- ☆12May 6, 2022Updated 3 years ago
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆42Jan 25, 2024Updated 2 years ago
- ☆38Jul 13, 2020Updated 5 years ago
- It is the official code of the AAAI-24 paper "Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain"☆17Oct 11, 2025Updated 4 months ago
- ☆48Apr 7, 2025Updated 10 months ago
- On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them [NeurIPS 2020]☆36Jul 3, 2021Updated 4 years ago
- ☆47Jul 14, 2024Updated last year
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆13Dec 16, 2024Updated last year
- As-rigid-as-possible face deformation☆12Apr 18, 2014Updated 11 years ago
- ☆16Mar 17, 2025Updated 10 months ago
- code for the paper "Adversarial Reinforced Instruction Attacker for Robust Vision-Language Navigation" (TPAMI 2021)☆10Jul 15, 2022Updated 3 years ago