使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集
☆14Feb 5, 2021Updated 5 years ago
Alternatives and similar repositories for Backdoor_Attack_LeNet5_MNIST
Users that are interested in Backdoor_Attack_LeNet5_MNIST are comparing it to the libraries listed below
Sorting:
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆21Jun 3, 2020Updated 5 years ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆13Aug 25, 2021Updated 4 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆133Oct 24, 2023Updated 2 years ago
- Code for paper 'FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis'☆38Sep 12, 2022Updated 3 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- The PyTorch implementation of "Modeling Financial Time Series using LSTM with Trainable Initial Hidden States"☆11Jul 15, 2020Updated 5 years ago
- Official implementation of "COExpander: Adaptive Solution Expansion for Combinatorial Optimization".☆21Jun 28, 2025Updated 8 months ago
- This is the repository for the work "An ensemble mechanism to tackle the heterogeneity in asynchronous federated learning"☆11Nov 19, 2021Updated 4 years ago
- some code and papers related to dynamic graph neural networks☆10Jul 12, 2020Updated 5 years ago
- PyTorch code of “Out-of-Sample Representation Learning for Multi-Relational Graphs” (EMNLP 2020)☆10Oct 2, 2020Updated 5 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- The code for our AAAI 22 paper "Semi-Supervised Learning with Multi-Head Co-Training" and journal submission.☆11May 14, 2023Updated 2 years ago
- An algorithm based on Java implementation, can automatically check the set of outliers in a set of data, eliminate these outliers, and fi…☆12May 11, 2021Updated 4 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆105Aug 2, 2022Updated 3 years ago
- Comparing performance of different InfoNCE type losses used in contrastive learning.☆14Jun 12, 2024Updated last year
- ☆10Jan 2, 2022Updated 4 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- 本项目演示联邦学习方法☆11Aug 1, 2019Updated 6 years ago
- 哈工大2021秋计算机网络☆13Mar 30, 2023Updated 2 years ago
- Adapting LIME explanations for Time Series Data☆17Oct 31, 2024Updated last year
- Automated Simulations of Adversarial Attacks on Arbitrary Objects in Realistic Scenes☆14Oct 5, 2025Updated 4 months ago
- 哈工大2020春大学物理☆13Jun 9, 2022Updated 3 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆135Nov 11, 2024Updated last year
- basic algorithms of Computer Science☆11Apr 24, 2016Updated 9 years ago
- ☆17Oct 19, 2023Updated 2 years ago
- Project in the book of The Elements of Computer Systems: Building a Modern Computer from First Principles☆14Aug 2, 2021Updated 4 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- Byzantine-robust Federated Learning☆16Sep 21, 2023Updated 2 years ago
- This is a tensorflow-keras implementation of our paper "Attention Based Dynamic Graph Learning Framework for Asset Pricing"☆14Dec 13, 2021Updated 4 years ago
- ☆18Dec 14, 2020Updated 5 years ago
- ☆20Aug 7, 2023Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆62Nov 12, 2024Updated last year
- Codes and Dataset (DFDM) for Face-swap Deepfakes Model Attribution☆22Jul 13, 2025Updated 7 months ago
- Latent Space Virtual Adversarial Training (ECCV 2020)☆17Nov 12, 2020Updated 5 years ago
- PyTorch implementation of the paper [Semi-Supervised Learning With GANs: Revisiting Manifold Regularization].☆20Sep 21, 2020Updated 5 years ago
- 哈工大2022春模式识别与深度学习☆16Mar 30, 2023Updated 2 years ago
- ☆16Oct 5, 2022Updated 3 years ago
- code of the CVPR 2020 paper "Learning to Optimize on SPD Manifolds"☆13Sep 12, 2020Updated 5 years ago