Bob-cheng / BadPartLinks
"BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"
☆13Updated last year
Alternatives and similar repositories for BadPart
Users that are interested in BadPart are comparing it to the libraries listed below
Sorting:
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Updated 4 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Updated 4 years ago
- This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation …☆21Updated last year
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Updated 2 years ago
- [ICLR 2025] REFINE: Inversion-Free Backdoor Defense via Model Reprogramming☆12Updated 11 months ago
- ☆24Updated last year
- An awesome & curated list of autonomous driving security papers☆69Updated 3 weeks ago
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆17Updated 5 years ago
- ☆25Updated last year
- ☆73Updated 3 years ago
- Code for ML Doctor☆92Updated last year
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Updated 4 years ago
- A paper summary of Backdoor Attack against Neural Network☆13Updated 6 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Updated last year
- Integration of SplitNN for vertically partitioned data with OpenMined's PySyft☆28Updated 5 years ago
- The Pytorch implementation for the paper "Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection"☆20Updated last year
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Updated 2 years ago
- ☆17Updated 2 years ago
- ☆25Updated 2 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 3 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 3 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 5 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆73Updated 7 years ago
- Craft poisoned data using MetaPoison☆54Updated 4 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Updated last year
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆48Updated 3 years ago
- ☆25Updated 3 years ago
- Privacy attacks on Split Learning☆43Updated 4 years ago
- Official Inplementation of CVPR23 paper "Backdoor Defense via Deconfounded Representation Learning"☆25Updated 2 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Updated 3 years ago