使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集
☆14Feb 5, 2021Updated 5 years ago
Alternatives and similar repositories for Backdoor_Attack_LeNet5_MNIST
Users that are interested in Backdoor_Attack_LeNet5_MNIST are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆21Jun 3, 2020Updated 5 years ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆13Aug 25, 2021Updated 4 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆22Sep 8, 2021Updated 4 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆132Oct 24, 2023Updated 2 years ago
- Code for paper 'FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis'☆39Sep 12, 2022Updated 3 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- An algorithm based on Java implementation, can automatically check the set of outliers in a set of data, eliminate these outliers, and fi…☆12May 11, 2021Updated 4 years ago
- ☆21Aug 7, 2023Updated 2 years ago
- This is the repository for the work "An ensemble mechanism to tackle the heterogeneity in asynchronous federated learning"☆11Nov 19, 2021Updated 4 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- Simple pytorch classification baselines for MNIST, CIFAR and ImageNet☆19Aug 7, 2019Updated 6 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆22Dec 7, 2024Updated last year
- ☆13Sep 21, 2019Updated 6 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆136Nov 11, 2024Updated last year
- Invisible Backdoor Attack with Sample-Specific Triggers☆106Aug 2, 2022Updated 3 years ago
- LeNet, AleNet, VGGNet, GoogleNet, ResNet are used for MNIST dataset based on keras.☆15Dec 11, 2018Updated 7 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆196Sep 26, 2022Updated 3 years ago
- This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL im…☆10Aug 22, 2019Updated 6 years ago
- PyTorch code of “Out-of-Sample Representation Learning for Multi-Relational Graphs” (EMNLP 2020)☆10Oct 2, 2020Updated 5 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆62Nov 12, 2024Updated last year
- repository to research & share the "machine learning & security" articles☆20Jun 25, 2018Updated 7 years ago
- basic algorithms of Computer Science☆11Apr 24, 2016Updated 9 years ago
- Understanding the paper "Principles of Riemannian Geometry in Neural Networks" by Michael Hauser and Asok Ray☆11May 24, 2023Updated 2 years ago
- 爬虫实战:python3.6 + scrapy + mysql爬取 脚本之家☆17Sep 7, 2024Updated last year
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆313Feb 28, 2020Updated 6 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- The code for our AAAI 22 paper "Semi-Supervised Learning with Multi-Head Co-Training" and journal submission.☆11May 14, 2023Updated 2 years ago
- Byzantine-robust Federated Learning☆16Sep 21, 2023Updated 2 years ago
- Iwara网站数据爬取及本地化☆10Nov 23, 2022Updated 3 years ago
- 水源社区 API client☆17Dec 11, 2023Updated 2 years ago
- ☆20May 6, 2022Updated 3 years ago
- Implementations and demo of a regular Backdoor and a Latent backdoor attack on Deep Neural Networks.☆19Jul 9, 2022Updated 3 years ago
- Data-Efficient Backdoor Attacks☆20Jun 15, 2022Updated 3 years ago
- 基于LSB隐写术将文本隐藏于320x240的灰度图像☆21Nov 23, 2019Updated 6 years ago
- WAFFLE: Watermarking in Federated Learning☆23Aug 21, 2023Updated 2 years ago
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Jun 19, 2020Updated 5 years ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Aug 24, 2020Updated 5 years ago