☆13Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for SpatiotemporalAttack
Users that are interested in SpatiotemporalAttack are comparing it to the libraries listed below
Sorting:
- ☆12Sep 22, 2023Updated 2 years ago
- Multi-Target Embodied Question Answering☆26Jul 17, 2020Updated 5 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- Repository for Offline Visual Representation Learning v1 and v2☆13Jan 24, 2023Updated 3 years ago
- ☆12Mar 29, 2021Updated 4 years ago
- Official repository for the paper "Gradient-based Jailbreak Images for Multimodal Fusion Models" (https//arxiv.org/abs/2410.03489)☆19Oct 22, 2024Updated last year
- ☆17Nov 15, 2021Updated 4 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Code repository for the paper "Heuristic Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models"☆15Aug 7, 2025Updated 7 months ago
- ☆25Nov 4, 2024Updated last year
- A Paperlist of Adversarial Attack on Object Detection☆125Mar 16, 2023Updated 2 years ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆57Oct 25, 2022Updated 3 years ago
- ☆21Jul 16, 2019Updated 6 years ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆35Oct 23, 2024Updated last year
- Adversarial Attacks against Closed-Source MLLMs via Feature Optimal Alignment (NeurIPS 2025)☆49Nov 5, 2025Updated 4 months ago
- ☆67Jun 2, 2022Updated 3 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- Code to conduct an embedding attack on LLMs☆31Jan 10, 2025Updated last year
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Aug 17, 2023Updated 2 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- The code of "Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds" CVPR 2024☆36Mar 23, 2024Updated last year
- ☆12May 6, 2022Updated 3 years ago
- A Framework for Evaluating AI Agent Safety in Realistic Environments☆30Oct 2, 2025Updated 5 months ago
- Boosting the Class-Incremental Learning in 3D Point Clouds via Zero-Collection-Cost Basic Shape Pre-Training☆12Nov 30, 2024Updated last year
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆46Aug 12, 2023Updated 2 years ago
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆43Jan 25, 2024Updated 2 years ago
- ☆38Jul 13, 2020Updated 5 years ago
- ☆48Apr 7, 2025Updated 11 months ago
- On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them [NeurIPS 2020]☆36Jul 3, 2021Updated 4 years ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- It is the official code of the AAAI-24 paper "Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain"☆17Oct 11, 2025Updated 4 months ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- ☆46Jul 14, 2024Updated last year
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- As-rigid-as-possible face deformation☆12Apr 18, 2014Updated 11 years ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- Text Classification Models - CNN, RCNN, RNN-ATTN [PyTorch]☆11Oct 13, 2020Updated 5 years ago
- ☆16Mar 17, 2025Updated 11 months ago