AISIGSJTU / Siren
Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)
☆11Updated 10 months ago
Alternatives and similar repositories for Siren:
Users that are interested in Siren are comparing it to the libraries listed below
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆12Updated last month
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆16Updated 8 months ago
- [IEEE S&P 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆19Updated last month
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Updated 2 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆12Updated 2 months ago
- ☆14Updated 2 years ago
- A toolbox for backdoor attacks.☆20Updated 2 years ago
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆51Updated last month
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆14Updated last year
- ☆16Updated 4 months ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 2 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆46Updated 6 years ago
- ☆26Updated 2 years ago
- Code for ML Doctor☆85Updated 5 months ago
- FLTracer: Accurate Poisoning Attack Provenance in Federated Learning☆20Updated 7 months ago
- ☆14Updated last year
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆49Updated 2 years ago
- ☆54Updated last year
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆28Updated last month
- Code release for DeepJudge (S&P'22)☆50Updated last year
- ☆14Updated last year
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆26Updated 2 years ago
- ☆18Updated 2 years ago
- ☆16Updated 5 months ago
- Code for the paper: Label-Only Membership Inference Attacks☆64Updated 3 years ago
- ☆47Updated last year
- Official code for our NDSS paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarkin…☆25Updated 2 months ago
- ☆17Updated 3 years ago
- ☆24Updated last year