Source code for the Energy-Latency Attacks via Sponge Poisoning paper.
☆14Mar 14, 2022Updated 4 years ago
Alternatives and similar repositories for sponge_poisoning_energy_latency_attack
Users that are interested in sponge_poisoning_energy_latency_attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31Oct 14, 2021Updated 4 years ago
- ☆16Oct 1, 2025Updated 7 months ago
- Attack benchmark repository☆23Nov 25, 2025Updated 5 months ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- Security evaluation module with onnx, pytorch, and SecML.☆13Apr 9, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Recycling Model Updates in Federated Learning: Are Gradient Subspaces Low-Rank?☆15Mar 24, 2022Updated 4 years ago
- Repository for the Paper: Leave My Images Alone: Preventing Multi-Modal Large Language Models from Analyzing Images via Visual Prompt Inj…☆19Apr 17, 2026Updated 3 weeks ago
- ☆12Jun 13, 2025Updated 10 months ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- The Pytorch implementation for the paper "Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection"☆20Mar 9, 2024Updated 2 years ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆25Mar 13, 2022Updated 4 years ago
- [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆27Aug 1, 2025Updated 9 months ago
- ☆11May 30, 2024Updated last year
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆27Mar 6, 2023Updated 3 years ago
- LLM for solidity smart contract automated program repair☆18Mar 5, 2025Updated last year
- AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models☆21Nov 8, 2025Updated 6 months ago
- ☆12Mar 3, 2025Updated last year
- Lateral Inhibition-Inspired Convolutional Neural Network for Visual Attention and Saliency Detection☆13Nov 6, 2020Updated 5 years ago
- Tor consensus and server descriptor parser☆14Nov 24, 2022Updated 3 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- This is a Pytorch Implementation of the DASP algorithm from the paper "Explaining Deep Neural Networks with a Polynomial Time Algorithm f…☆11Jun 12, 2020Updated 5 years ago
- English and Chinese LaTeX template for reports/projects/proposal at Beijing Institute of Technology☆10Nov 19, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [ICML 2024] Codes for C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models☆18Jun 4, 2024Updated last year
- 本仓库收录西安交通大学钱学森书院学业辅导中心(qyxf)的相关学习资料☆24Oct 13, 2019Updated 6 years ago
- ☆17Feb 23, 2025Updated last year
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- ☆13Apr 3, 2024Updated 2 years ago
- JoPano: Unified Panorama Generation via Joint Modeling☆24Mar 6, 2026Updated 2 months ago
- ☆43Jan 25, 2024Updated 2 years ago
- A large-scale dataset composed of high-quality synthetic images aimed at evaluating social biases in LVLMs☆13Apr 7, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆150Oct 9, 2024Updated last year
- This is a project based on machine learning and deep learning method for playing Gobang by controlling mechanical arm(利用机械臂下五子棋)☆13Apr 16, 2023Updated 3 years ago
- Implementation of Confidence-Calibrated Adversarial Training (CCAT).☆45Aug 3, 2020Updated 5 years ago
- [NeurIPS 2023] Content-based Unrestricted Adversarial Attack☆31Jul 21, 2025Updated 9 months ago
- Survival of the Most Influential Prompts: Efficient Black-Box Prompt Search via Clustering and Pruning (Zhou et al.; EMNLP 2023 Findings)☆17Feb 17, 2024Updated 2 years ago
- A simple random onion site scanner with onion list☆17Aug 7, 2018Updated 7 years ago
- ☆21Nov 6, 2025Updated 6 months ago