[NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability
☆117Oct 31, 2023Updated 2 years ago
Alternatives and similar repositories for Diff-PGD
Users that are interested in Diff-PGD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆260Nov 23, 2025Updated 4 months ago
- ☆44Oct 9, 2024Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆61Apr 7, 2024Updated last year
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆39Feb 29, 2024Updated 2 years ago
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆31Jul 21, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- unformal implementation of advdiffuser☆17Feb 4, 2024Updated 2 years ago
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- PDM-based Purifier☆22Nov 5, 2024Updated last year
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- ☆16Jul 25, 2022Updated 3 years ago
- ☆28Sep 22, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆33Oct 9, 2023Updated 2 years ago
- ☆38Sep 14, 2024Updated last year
- ICCV 2021☆32Oct 6, 2021Updated 4 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 3 years ago
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆336Jan 29, 2023Updated 3 years ago
- ☆40Jan 7, 2023Updated 3 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- AdvT-shirt-1K A Physical-world Adversarial T-shirt Dataset for Adversarial Robustness Evaluation☆14Aug 7, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆26Feb 14, 2024Updated 2 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 8 months ago
- Adversarial Texture for Fooling Person Detectors in the Physical World☆62Oct 20, 2024Updated last year
- AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models☆20Nov 8, 2025Updated 4 months ago
- ☆62Aug 9, 2023Updated 2 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)☆16Mar 25, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆117Oct 11, 2024Updated last year
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Dec 7, 2024Updated last year
- ☆20Oct 5, 2023Updated 2 years ago
- ☆48Apr 7, 2025Updated 11 months ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆116Jul 21, 2022Updated 3 years ago
- ☆35Sep 6, 2025Updated 6 months ago