A list of recent adversarial attack and defense papers (including those on large language models)
☆44Mar 18, 2026Updated 2 months ago
Alternatives and similar repositories for NewAdversarialAttackPaper
Users that are interested in NewAdversarialAttackPaper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary Code Summarization☆13Apr 3, 2025Updated last year
- AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks☆19May 12, 2025Updated last year
- 针对大模型的后门攻击☆12Jun 30, 2024Updated last year
- ☆10Jun 5, 2021Updated 4 years ago
- ☆38Oct 17, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆15May 5, 2026Updated 2 weeks ago
- Code repository for our paper, "Medical Large Language Models are Vulnerable to Data Poisoning Attacks" (Nature Medicine, 2024).☆12Jan 5, 2025Updated last year
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 3 years ago
- 华中科技大学网络安全课程设计-Linux下的状态检测防火墙☆11Oct 17, 2022Updated 3 years ago
- ☆14Sep 22, 2025Updated 7 months ago
- ☆25May 28, 2025Updated 11 months ago
- Collection of AI and Security Papers☆26Apr 17, 2020Updated 6 years ago
- ☆23Jan 6, 2025Updated last year
- A framework for steering MoE models by detecting and controlling behavior-linked experts.☆34Sep 12, 2025Updated 8 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆14Jun 19, 2024Updated last year
- ☆77Jan 21, 2026Updated 4 months ago
- 华中科技大学-网络空间安全学院-计算机网络安全实验-2022春☆10Aug 28, 2022Updated 3 years ago
- A curated list of papers for the transferability of adversarial examples☆77Jul 8, 2024Updated last year
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆21Sep 18, 2025Updated 8 months ago
- Robust Adversarial Objects against Deep Learning Models☆11Mar 28, 2020Updated 6 years ago
- ☆13Apr 2, 2025Updated last year
- ☆10May 14, 2024Updated 2 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Jun 30, 2023Updated 2 years ago
- A fuzzer for the CAN bus☆18Mar 1, 2025Updated last year
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- Visualization of Adversarial Examples☆34Oct 14, 2018Updated 7 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated 2 years ago
- [ECCVW 2024 -- ORAL] Official repository of paper titled "Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors".☆12Oct 11, 2024Updated last year
- ☆22Sep 23, 2025Updated 7 months ago
- Mirror of Apache Ode Jacob☆12Mar 8, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds (ECCV 2020)☆44Oct 19, 2020Updated 5 years ago
- Archive of Apache Qpid JMS AMQP 0-x☆12Apr 15, 2026Updated last month
- The code of paper "O-Mamba: O-shape State-Space Model for Underwater Image Enhancement"☆14Oct 18, 2024Updated last year
- official Pytorch implementation of paper 'Improving transferability of 3D adversarial attacks with scale and shear transformations', Info…☆10Apr 26, 2024Updated 2 years ago
- Apache Onami (retired)☆11Jan 25, 2019Updated 7 years ago
- ☆18Apr 27, 2022Updated 4 years ago
- This repository contains the PyTorch implementation of Zeroth Order Optimization Based Adversarial Black Box Attack (https://arxiv.org/ab…☆43Feb 25, 2023Updated 3 years ago