☆20Jan 15, 2024Updated 2 years ago
Alternatives and similar repositories for TMM
Users that are interested in TMM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆67Mar 20, 2023Updated 3 years ago
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆31Nov 15, 2025Updated 4 months ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆72Sep 6, 2023Updated 2 years ago
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆18Oct 20, 2024Updated last year
- ☆78Jan 21, 2026Updated 2 months ago
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆66Mar 22, 2025Updated last year
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆22Feb 23, 2024Updated 2 years ago
- nocaps: novel object captioning at scale☆10May 23, 2019Updated 6 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆466Feb 27, 2026Updated last month
- The implementation of our ACM MM 2023 paper "AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning"☆99Aug 25, 2023Updated 2 years ago
- One Prompt Word is Enough to Boost Adversarial Robustness for Pre-trained Vision-Language Models☆59Dec 20, 2024Updated last year
- Adversarial Attacks against Closed-Source MLLMs via Feature Optimal Alignment (NeurIPS 2025)☆55Nov 5, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Awesome-Adversarial-Attack-Methods-Summary☆13Jul 24, 2024Updated last year
- 😎 up-to-date & curated list of awesome Attacks on Large-Vision-Language-Models papers, methods & resources.☆526Updated this week
- ☆15Dec 18, 2024Updated last year
- ☆36Feb 23, 2024Updated 2 years ago
- [AAAI 2026] This is the official implementation of the paper "ExtendAttack: Attacking Servers of LRMs via Extending Reasoning".☆22Mar 18, 2026Updated 3 weeks ago
- An unofficial PyTorch implementation of MixMatch - A Holistic Approach to Semi-Supervised Learning☆14Aug 10, 2021Updated 4 years ago
- ☆71May 18, 2021Updated 4 years ago
- Code Repository to check robustness of 3D Deep Learning (Volumetric and PointNet) to occlusion attacks☆15Apr 2, 2019Updated 7 years ago
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆37Jul 3, 2024Updated last year
- ☆37Oct 2, 2024Updated last year
- 🛡 A curated list of adversarial attacks in PyTorch, with a focus on transferable black-box attacks.☆70Dec 22, 2025Updated 3 months ago
- ☆16Sep 17, 2024Updated last year
- ☆37Sep 30, 2024Updated last year
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- ☆11Dec 23, 2024Updated last year
- ☆14Oct 14, 2020Updated 5 years ago
- The code of the paper "Improving Multimodal Fake News Detection by Leveraging Cross-modal Content Correlation"☆16Feb 22, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Code & data accompanying the paper ["Unveiling Implicit Deceptive Patterns in Multi-modal Fake News via Neuro-Symbolic Reasoning"].☆13Dec 21, 2023Updated 2 years ago
- Source code of "Multimodal Matching-aware Co-attention Networks with Mutual Knowledge Distillation for Fake News Detection"☆14Nov 17, 2023Updated 2 years ago
- Official PyTorch implementation of our paper "Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World A…☆11Feb 8, 2023Updated 3 years ago
- ☆13Jan 14, 2022Updated 4 years ago
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 4 years ago
- A Backdoor Attack against 3D Point Cloud Classifiers (ICCV2021)☆18Oct 20, 2021Updated 4 years ago
- An awesome & curated list of autonomous driving security papers☆74Jan 12, 2026Updated 3 months ago