A list of recent adversarial attack and defense papers (including those on large language models)
☆45Mar 18, 2026Updated last week
Alternatives and similar repositories for NewAdversarialAttackPaper
Users that are interested in NewAdversarialAttackPaper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary Code Summarization☆14Apr 3, 2025Updated 11 months ago
- AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks☆19May 12, 2025Updated 10 months ago
- 针对大模型的后门攻击☆12Jun 30, 2024Updated last year
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- ☆10Jun 5, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆37Oct 17, 2024Updated last year
- ☆12Nov 10, 2020Updated 5 years ago
- ☆14May 8, 2024Updated last year
- AAAI 2025: Autonomous LLM-enhanced adversarial attack for text-to-motion☆18Sep 15, 2025Updated 6 months ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 3 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆141Sep 11, 2025Updated 6 months ago
- ☆21Jan 6, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆23May 28, 2025Updated 9 months ago
- Official implementation of the paper "Bridging Coexistence of Unlabelled Classes for Semi-supervised Incremental Object Detection"☆16Jan 20, 2024Updated 2 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- ☆14Jun 19, 2024Updated last year
- ☆76Jan 21, 2026Updated 2 months ago
- A curated list of papers for the transferability of adversarial examples☆76Jul 8, 2024Updated last year
- 华中科技大学-网络 空间安全学院-计算机网络安全实验-2022春☆10Aug 28, 2022Updated 3 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 6 months ago
- Robust Adversarial Objects against Deep Learning Models☆12Mar 28, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Apr 2, 2025Updated 11 months ago
- ☆60Aug 11, 2024Updated last year
- ☆11May 14, 2024Updated last year
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Jun 30, 2023Updated 2 years ago
- A fuzzer for the CAN bus☆18Mar 1, 2025Updated last year
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- The code for AAAI2023 (Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization)☆13Dec 24, 2022Updated 3 years ago
- [ECCVW 2024 -- ORAL] Official repository of paper titled "Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors".☆12Oct 11, 2024Updated last year
- [ArXiv 2025] Denial-of-Service Poisoning Attacks on Large Language Models☆23Oct 22, 2024Updated last year
- Natural Language Attacks in a Hard Label Black Box Setting.☆50May 26, 2021Updated 4 years ago
- Mirror of Apache Ode Jacob☆12Mar 8, 2018Updated 8 years ago
- Unleashing the Power of LLM to Infer State Machine from the Protocol Implementation☆19Jun 9, 2025Updated 9 months ago
- official Pytorch implementation of paper 'Improving transferability of 3D adversarial attacks with scale and shear transformations', Info…☆11Apr 26, 2024Updated last year