Source code for the Energy-Latency Attacks via Sponge Poisoning paper.
☆15Mar 14, 2022Updated 4 years ago
Alternatives and similar repositories for sponge_poisoning_energy_latency_attack
Users that are interested in sponge_poisoning_energy_latency_attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Oct 14, 2021Updated 4 years ago
- Attack benchmark repository☆22Nov 25, 2025Updated 4 months ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- Security evaluation module with onnx, pytorch, and SecML.☆13Apr 9, 2022Updated 3 years ago
- [ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining☆19Feb 26, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Repository for the Paper: Refusing Safe Prompts for Multi-modal Large Language Models☆18Oct 16, 2024Updated last year
- ☆10Jun 13, 2025Updated 9 months ago
- Code for the paper "Watermarking Makes Language Models Radioactive"☆21Oct 25, 2024Updated last year
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- ☆15Aug 5, 2020Updated 5 years ago
- The Pytorch implementation for the paper "Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection"☆20Mar 9, 2024Updated 2 years ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆25Mar 13, 2022Updated 4 years ago
- 中国科学院大学2022-2023春季学期自然语言处理课 程☆30Sep 19, 2023Updated 2 years ago
- [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆26Aug 1, 2025Updated 7 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models☆20Nov 8, 2025Updated 4 months ago
- ☆11May 30, 2024Updated last year
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆27Mar 6, 2023Updated 3 years ago
- LLM for solidity smart contract automated program repair☆18Mar 5, 2025Updated last year
- Official implementation for Neural networks with recurrent generative feedback (NeurIPS 2020).☆22Nov 10, 2020Updated 5 years ago
- This repo contains information about FeB4RAG collection☆17Feb 19, 2024Updated 2 years ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- ☆12Mar 3, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Lateral Inhibition-Inspired Convolutional Neural Network for Visual Attention and Saliency Detection☆13Nov 6, 2020Updated 5 years ago
- ☆98Oct 15, 2023Updated 2 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- English and Chinese LaTeX template for reports/projects/proposal at Beijing Institute of Technology☆10Nov 19, 2020Updated 5 years ago
- This is a Pytorch Implementation of the DASP algorithm from the paper "Explaining Deep Neural Networks with a Polynomial Time Algorithm f…☆11Jun 12, 2020Updated 5 years ago
- [ICML 2024] Codes for C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models☆18Jun 4, 2024Updated last year
- [Disclaimer FireROOT] This repository is for research purposes only, the use of this code is your responsibility. CONTACT ME: Attack@dark…☆13Jan 24, 2023Updated 3 years ago
- ☆16Feb 23, 2025Updated last year
- 本仓库收录西安交通大学钱学森书院学业辅导中心(qyxf)的相关学习资料☆24Oct 13, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- ☆12Dec 22, 2023Updated 2 years ago
- A simple random onion site scanner with onion list☆16Aug 7, 2018Updated 7 years ago
- ☆13Apr 3, 2024Updated last year
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆29Nov 19, 2023Updated 2 years ago
- A new model-based algorithm for offline inverse reinforcement learning☆15Feb 20, 2023Updated 3 years ago