Bob-cheng / BadPartLinks
"BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"
☆13Updated last year
Alternatives and similar repositories for BadPart
Users that are interested in BadPart are comparing it to the libraries listed below
Sorting:
- [ICLR 2025] REFINE: Inversion-Free Backdoor Defense via Model Reprogramming☆12Updated 11 months ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Updated 4 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Updated 4 years ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Updated 2 years ago
- ☆13Updated last year
- ☆12Updated 2 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated 2 years ago
- The Pytorch implementation for the paper "Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection"☆20Updated last year
- A paper summary of Backdoor Attack against Neural Network☆13Updated 6 years ago
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Updated 4 years ago
- This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation …☆21Updated last year
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 5 years ago
- ☆25Updated 2 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆44Updated 2 years ago
- ☆81Updated 3 years ago
- ☆33Updated last month
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Updated 3 years ago
- ☆25Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Updated 6 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Updated 11 months ago
- ☆68Updated 5 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 6 years ago
- ☆29Updated 2 years ago
- ☆25Updated last year
- ☆26Updated 3 years ago
- verifying machine unlearning by backdooring☆20Updated 2 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Updated 2 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆73Updated 7 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆48Updated 3 years ago
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆17Updated 5 years ago