Bitadr / DeepSignsLinks
☆24Updated 6 years ago
Alternatives and similar repositories for DeepSigns
Users that are interested in DeepSigns are comparing it to the libraries listed below
Sorting:
- [NeurIPS 2019] This is the code repo of our novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into va…☆84Updated 2 years ago
- ☆50Updated 4 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Updated 3 years ago
- ConvexPolytopePosioning☆37Updated 6 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆34Updated 4 years ago
- ☆23Updated 5 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆100Updated 5 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆44Updated 2 years ago
- ☆16Updated 4 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated 2 years ago
- ☆19Updated 3 years ago
- ☆88Updated 4 years ago
- Craft poisoned data using MetaPoison☆54Updated 4 years ago
- ☆69Updated last year
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 3 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Updated 4 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Updated 5 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆75Updated last year
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Updated 4 years ago
- ☆42Updated 2 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 3 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆114Updated 3 years ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆58Updated last year
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Updated 5 years ago
- ☆25Updated 3 years ago
- Universal Adversarial Networks☆32Updated 7 years ago
- ☆19Updated 4 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆37Updated last year
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 3 years ago
- ☆58Updated 3 years ago