Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode
☆17Feb 16, 2025Updated last year
Alternatives and similar repositories for daca
Users that are interested in daca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆197Apr 7, 2025Updated last year
- Official repository for "On the Multi-modal Vulnerability of Diffusion Models"☆16Jul 15, 2024Updated last year
- ☆35May 22, 2024Updated last year
- ☆42Jan 15, 2025Updated last year
- List of T2I safety papers, updated daily, welcome to discuss using Discussions☆68Aug 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- [ICML 2024] Prompting4Debugging: Red-Teaming Text-to-Image Diffusion Models by Finding Problematic Prompts (Official Pytorch Implementati…☆51Jan 11, 2026Updated 2 months ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- This is the official repo of the paper "Latent Guard: a Safety Framework for Text-to-image Generation"☆53Oct 24, 2024Updated last year
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆27Aug 27, 2024Updated last year
- Official Implementation of Safe Latent Diffusion for Text2Image☆96Apr 21, 2023Updated 2 years ago
- ☆20Feb 3, 2025Updated last year
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆96Dec 20, 2025Updated 3 months ago
- ☆12Jan 14, 2026Updated 2 months ago
- ☆14Jun 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆39Oct 17, 2024Updated last year
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆43Mar 19, 2026Updated 3 weeks ago
- ☆48Jul 14, 2024Updated last year
- Universal Adversarial Perturbations for Vision-Language Pre-trained Models☆24Aug 8, 2025Updated 8 months ago
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- ☆23Dec 14, 2023Updated 2 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- ☆17Sep 25, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆52May 24, 2023Updated 2 years ago
- Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Models☆271May 13, 2024Updated last year
- ☆55Dec 7, 2024Updated last year
- A package that achieves 95%+ transfer attack success rate against GPT-4☆26Oct 24, 2024Updated last year
- ☆68Sep 30, 2025Updated 6 months ago
- [WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability☆18May 30, 2025Updated 10 months ago
- The official implementation of ECCV'24 paper "To Generate or Not? Safety-Driven Unlearned Diffusion Models Are Still Easy To Generate Uns…☆87Feb 28, 2025Updated last year
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- The reinforcement learning codes for dataset SPA-VL☆47Jun 24, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆23Feb 5, 2026Updated 2 months ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆20Aug 22, 2024Updated last year
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆31Nov 15, 2025Updated 4 months ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆20Jan 24, 2024Updated 2 years ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆67Mar 20, 2023Updated 3 years ago
- ☆20Sep 13, 2021Updated 4 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago