yibo-miao / T2VSafetyBenchView external linksLinks
☆25Nov 4, 2024Updated last year
Alternatives and similar repositories for T2VSafetyBench
Users that are interested in T2VSafetyBench are comparing it to the libraries listed below
Sorting:
- Official repository for "On the Multi-modal Vulnerability of Diffusion Models"☆16Jul 15, 2024Updated last year
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- ☆14Oct 6, 2024Updated last year
- ☆39May 17, 2025Updated 9 months ago
- ☆13Dec 8, 2022Updated 3 years ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆90Dec 20, 2025Updated last month
- ☆114Dec 3, 2025Updated 2 months ago
- Code repository for the paper "Heuristic Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models"☆15Aug 7, 2025Updated 6 months ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆34Oct 23, 2024Updated last year
- Official codebase for "STAIR: Improving Safety Alignment with Introspective Reasoning"☆88Feb 26, 2025Updated 11 months ago
- [NeurIPS 2024] Accelerating Greedy Coordinate Gradient and General Prompt Optimization via Probe Sampling☆33Nov 8, 2024Updated last year
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Aug 17, 2023Updated 2 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 3 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- [ICML 2024] Safety Fine-Tuning at (Almost) No Cost: A Baseline for Vision Large Language Models.☆84Jan 19, 2025Updated last year
- ☆12May 6, 2022Updated 3 years ago
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆39Jan 17, 2025Updated last year
- The code of "Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds" CVPR 2024☆36Mar 23, 2024Updated last year
- A Framework for Evaluating AI Agent Safety in Realistic Environments☆30Oct 2, 2025Updated 4 months ago
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆40Aug 6, 2024Updated last year
- [CVPR2024] MMA-Diffusion: MultiModal Attack on Diffusion Models☆383Jan 8, 2026Updated last month
- Accepted by IJCAI-24 Survey Track☆231Aug 25, 2024Updated last year
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆191Jun 26, 2025Updated 7 months ago
- ☆48Apr 7, 2025Updated 10 months ago
- A Benchmark for Evaluating Safety and Trustworthiness in Web Agents for Enterprise Scenarios☆19Feb 8, 2026Updated last week
- ☆13Oct 21, 2024Updated last year
- It is the official code of the AAAI-24 paper "Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain"☆17Oct 11, 2025Updated 4 months ago
- ☆22Dec 11, 2025Updated 2 months ago
- [USENIX'25] HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns☆13Mar 1, 2025Updated 11 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- ☆12Jul 14, 2025Updated 7 months ago
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Models☆50Jan 11, 2025Updated last year
- ☆47Jul 14, 2024Updated last year
- Accepted by ECCV 2024☆186Oct 15, 2024Updated last year
- ☆10Dec 18, 2024Updated last year
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- ☆23Jul 29, 2025Updated 6 months ago
- Code for Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks (TIFS2024)☆13Mar 29, 2024Updated last year
- Code for running forward and backward versions of GPT2☆10Nov 20, 2021Updated 4 years ago