使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集
☆14Feb 5, 2021Updated 5 years ago
Alternatives and similar repositories for Backdoor_Attack_LeNet5_MNIST
Users that are interested in Backdoor_Attack_LeNet5_MNIST are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆23Sep 8, 2021Updated 4 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆132Oct 24, 2023Updated 2 years ago
- ☆21Aug 7, 2023Updated 2 years ago
- This is the repository for the work "An ensemble mechanism to tackle the heterogeneity in asynchronous federated learning"☆11Nov 19, 2021Updated 4 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple pytorch classification baselines for MNIST, CIFAR and ImageNet☆19Aug 7, 2019Updated 6 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- Reference code modeling the communication framework conceived within the IEEE P1906.1 working group☆11Mar 22, 2017Updated 9 years ago
- Implementation of Reinforcement learning algortihm in HTTP Adaptive Streaming (HAS) over NS3☆12May 6, 2020Updated 5 years ago
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆22Dec 7, 2024Updated last year
- 本项目演示联邦学习方法☆11Aug 1, 2019Updated 6 years ago
- Reinforcement Learning for Energy Imbalance Management using Voltage Control on TCLs☆12Jan 4, 2020Updated 6 years ago
- ☆13Sep 21, 2019Updated 6 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆139Nov 11, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆10Jan 2, 2022Updated 4 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆106Aug 2, 2022Updated 3 years ago
- Federated Reinforcement Learning☆12Jun 20, 2019Updated 6 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆198Sep 26, 2022Updated 3 years ago
- ☆13Mar 4, 2019Updated 7 years ago
- This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL im…☆10Aug 22, 2019Updated 6 years ago
- The PyTorch implementation of "Modeling Financial Time Series using LSTM with Trainable Initial Hidden States"☆11Jul 15, 2020Updated 5 years ago
- A toolbox for Distribution Optimal Power Flow (D-OPF) Algorithms☆12Feb 10, 2020Updated 6 years ago
- PyTorch code of “Out-of-Sample Representation Learning for Multi-Relational Graphs” (EMNLP 2020)☆10Oct 2, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆62Nov 12, 2024Updated last year
- Adversarial Lipschitz Regularization☆10Jun 10, 2021Updated 4 years ago
- 情侣养成类小程序,增进感情,可以设定一些任务与奖励,完成任务获取一定积分,获取奖励消耗一定积分☆10Apr 22, 2022Updated 3 years ago
- Understanding the paper "Principles of Riemannian Geometry in Neural Networks" by Michael Hauser and Asok Ray☆11May 24, 2023Updated 2 years ago
- ImaginaryNet: Learning Object Detectors without Real Images and Annotations☆26Mar 11, 2023Updated 3 years ago
- 爬虫实战:python3.6 + scrapy + mysql爬取 脚本之家☆17Sep 7, 2024Updated last year
- ☆14Dec 4, 2018Updated 7 years ago
- Embedder with binary sparse distributed representation.☆20May 15, 2025Updated 10 months ago
- MPTCP Deep Reinforcement Learning☆13Jun 22, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- Byzantine-robust Federated Learning☆16Sep 21, 2023Updated 2 years ago
- The code for our AAAI 22 paper "Semi-Supervised Learning with Multi-Head Co-Training" and journal submission.☆11May 14, 2023Updated 2 years ago
- Computer networks course design.☆14Jan 26, 2019Updated 7 years ago
- ☆20May 6, 2022Updated 3 years ago
- Implementations and demo of a regular Backdoor and a Latent backdoor attack on Deep Neural Networks.☆19Jul 9, 2022Updated 3 years ago
- Data-Efficient Backdoor Attacks☆20Jun 15, 2022Updated 3 years ago