[BMVC 2023] Semantic Adversarial Attacks via Diffusion Models
☆25Nov 30, 2023Updated 2 years ago
Alternatives and similar repositories for semantic_adv_via_dm
Users that are interested in semantic_adv_via_dm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆262Nov 23, 2025Updated 4 months ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Official repo for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization☆16Mar 8, 2024Updated 2 years ago
- [CVPR 2024] Official repository of paper "DiffAM: Diffusion-based Adversarial Makeup Transfer for Facial Privacy Protection".☆55Oct 14, 2024Updated last year
- Code for our NeurIPS 2023 paper Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly☆14Jan 22, 2024Updated 2 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- Code for AAAI 2024 paper: CR-SAM: Curvature Regularized Sharpness-Aware Minimization☆12Nov 29, 2024Updated last year
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆45Aug 12, 2023Updated 2 years ago
- [CVPR 2023] Official repository of paper titled "CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent …☆102Mar 25, 2024Updated 2 years ago
- CelebA HQ Face Identity and Attributes Recognition using PyTorch☆42Nov 3, 2023Updated 2 years ago
- Code for paper "Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers"☆17Jan 27, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Official PyTorch Implementation for G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors (TIFS-2024)☆17Aug 27, 2024Updated last year
- The official PyTorch implementations for Latent-HSJA.☆29Nov 3, 2023Updated 2 years ago
- Official implementation of the paper "Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces" (CVPR 23)☆46Jan 24, 2024Updated 2 years ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆38Apr 23, 2025Updated 11 months ago
- StrAttack, ICLR 2019☆33Aug 4, 2019Updated 6 years ago
- ☆42Mar 11, 2022Updated 4 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆28Aug 17, 2023Updated 2 years ago
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆30Oct 24, 2021Updated 4 years ago
- [ICCV 2023] Zero-shot image editing with stochastic diffusion models☆59Sep 7, 2023Updated 2 years ago
- Official Code for reproductivity of the NeurIPS 2023 paper: Adversarial Examples Are Not Real Features☆16Jun 27, 2024Updated last year
- unformal implementation of advdiffuser☆17Feb 4, 2024Updated 2 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆24Feb 23, 2024Updated 2 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆23Feb 10, 2025Updated last year
- 3D Gaussian Splat Easily Attacked to Cause Harm☆12Aug 5, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [ICCV 2023] Code for "Distracting Downpour: Adversarial Weather Attacks for Motion Estimation"☆19Aug 17, 2023Updated 2 years ago
- ☆14Oct 21, 2021Updated 4 years ago
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆31Nov 9, 2021Updated 4 years ago
- [ECCVW 2024 -- ORAL] Official repository of paper titled "Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors".☆12Oct 11, 2024Updated last year
- PyTorch implementation of denoising diffusion probabilistic models.☆32Apr 13, 2021Updated 5 years ago
- ☆12Mar 5, 2024Updated 2 years ago
- [ACM MM 2024] ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack☆14Dec 20, 2024Updated last year