The code for ACM MM2024 (Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning)
☆15Jul 18, 2024Updated last year
Alternatives and similar repositories for Multimodal-Unlearnable-Examples
Users that are interested in Multimodal-Unlearnable-Examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks (TIFS2024)☆13Mar 29, 2024Updated 2 years ago
- ☆23Jan 5, 2026Updated 3 months ago
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆37Jun 4, 2024Updated last year
- Code for Transferable Unlearnable Examples☆22Mar 11, 2023Updated 3 years ago
- Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness. (MD attacks)☆11Aug 29, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- AdvT-shirt-1K A Physical-world Adversarial T-shirt Dataset for Adversarial Robustness Evaluation☆14Aug 7, 2025Updated 8 months ago
- this is for the ACM MM paper---Backdoor Attack on Crowd Counting☆17Jul 10, 2022Updated 3 years ago
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆28Nov 25, 2022Updated 3 years ago
- Hyperbolic Safety-Aware Vision-Language Models. CVPR 2025☆30Apr 8, 2025Updated last year
- The Oyster series is a set of safety models developed in-house by Alibaba-AAIG, devoted to building a responsible AI ecosystem. | Oyster …☆60Apr 2, 2026Updated last week
- [CVPR 2025] Official implementation for JOOD "Playing the Fool: Jailbreaking LLMs and Multimodal LLMs with Out-of-Distribution Strategy"☆22Jun 11, 2025Updated 9 months ago
- CVPR2023: Unlearnable Clusters: Towards Label-agnostic Unlearnable Examples☆22Apr 25, 2023Updated 2 years ago
- [ICLR 2025] BlueSuffix: Reinforced Blue Teaming for Vision-Language Models Against Jailbreak Attacks☆31Nov 2, 2025Updated 5 months ago
- [ICLR 2022] "Sparsity Winning Twice: Better Robust Generalization from More Efficient Training" by Tianlong Chen*, Zhenyu Zhang*, Pengjun…☆40Mar 20, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- [ICLR 2026] The official code for "Doxing via the Lens: Revealing Location-related Privacy Leakage on Multi-modal Large Reasoning Models"☆26Feb 7, 2026Updated 2 months ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- ☆10May 8, 2024Updated last year
- The code of "Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds" CVPR 2024☆36Mar 23, 2024Updated 2 years ago
- [CVPR2020] Clean-Label Backdoor Attacks on Video Recognition Models☆41Jun 19, 2020Updated 5 years ago
- Implementation for ACProp ( Momentum centering and asynchronous update for adaptive gradient methdos, NeurIPS 2021)☆16Oct 11, 2021Updated 4 years ago
- ☆27Jan 23, 2024Updated 2 years ago
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆173Jul 5, 2024Updated last year
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Repository for the Paper: Refusing Safe Prompts for Multi-modal Large Language Models☆19Oct 16, 2024Updated last year
- Get CLIP ViT text tokens about an image, visualize attention as a heatmap.☆15Aug 8, 2023Updated 2 years ago
- ☆22Sep 5, 2025Updated 7 months ago
- (2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition☆10Oct 18, 2025Updated 5 months ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆152Oct 15, 2020Updated 5 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- This repository is for our survey paper: "A Comprehensive Survey on Multimodal RAG: All Combinations of Modalities as Input and Output"☆48Nov 21, 2025Updated 4 months ago
- ☆44Oct 9, 2024Updated last year
- 这是一个基于Vue3的现代化AI聊天应用。☆19Aug 8, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Skill-Inject: Measuring Agent Vulnerability to Skill File Attacks☆44Mar 26, 2026Updated 2 weeks ago
- Large Language Models Can Be Contextual Privacy Protection Learners☆16Oct 28, 2024Updated last year
- My implement of InstantBooth☆13Sep 11, 2023Updated 2 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- [AAAI2023] NAS-LID: Efficient Neural Architecture Search with Local Intrinsic Dimension☆17Dec 20, 2022Updated 3 years ago
- Examples for the Spartan HPC cluster.☆10Sep 2, 2019Updated 6 years ago
- ☆12May 6, 2022Updated 3 years ago