A data-free backdoor detector for deep neural networks
☆21Mar 8, 2023Updated 3 years ago
Alternatives and similar repositories for Data-Free-Neural-Backdoor-Detector-FreeEagle
Users that are interested in Data-Free-Neural-Backdoor-Detector-FreeEagle are comparing it to the libraries listed below
Sorting:
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆16May 12, 2024Updated last year
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- ☆27Nov 9, 2022Updated 3 years ago
- 该项目是一个基于Cloudflare的Pages实现的Docker镜像代理工具。可以有效的中转对Docker官方镜像的请求,解决当下访问限制问题☆10Aug 19, 2024Updated last year
- One-shot Recognition for Unseen Gesture with COTS WiFi☆41Jun 6, 2022Updated 3 years ago
- Dart library to parse FIDO2 request / response and interactive with FIDO2 (CTAP) authenticators.☆14Sep 9, 2025Updated 6 months ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- A simple implementation of BadNets on MNIST☆33Jul 29, 2019Updated 6 years ago
- ☆10Oct 13, 2022Updated 3 years ago
- LLM驱动的社交网络模拟系统; LLM-driven social network simulation system☆10Oct 13, 2024Updated last year
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- ☆10Jun 11, 2023Updated 2 years ago
- ☆12Nov 2, 2024Updated last year
- Docker container exposing a preconfigured python environment for Social Network Analysis☆14Feb 4, 2023Updated 3 years ago
- ☆12Mar 5, 2024Updated 2 years ago
- Corpus of Black Lives Matters and counter protests tweets☆14Dec 22, 2022Updated 3 years ago
- Crowd: a social network simulation framework in Python☆16Jul 15, 2025Updated 7 months ago
- 无线感知相关论文☆11Oct 26, 2021Updated 4 years ago
- ICLR 2019 Paper, "Characterizing Audio Adversarial Examples using Temporal Dependency".☆12Apr 3, 2019Updated 6 years ago
- ☆13Jun 1, 2024Updated last year
- ☆53Jan 7, 2022Updated 4 years ago
- ☆14May 7, 2022Updated 3 years ago
- Decoding Echo Chambers: LLM-Powered Simulations Revealing Polarization in Social Networks☆19Dec 11, 2024Updated last year
- ☆11Dec 16, 2024Updated last year
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- ☆11May 17, 2024Updated last year
- 采用三种方式 (1)利用keras库搭建seq2seq (2)利用keras_transformer库 (3)利用fastnlp框架 实现问答机器人、机器翻译、文本摘要等功能☆14Nov 16, 2020Updated 5 years ago
- ☆13May 1, 2024Updated last year
- ☆15Sep 6, 2020Updated 5 years ago
- KNN Defense Against Clean Label Poisoning Attacks☆13Sep 24, 2021Updated 4 years ago
- PyTorch implementation of "Pruning Filters For Efficient ConvNets"☆16Sep 28, 2021Updated 4 years ago
- 基于lstm,word2vec做的豆瓣网电影评论情感分析,后期会进行 整理并使用textcnn☆15Aug 9, 2019Updated 6 years ago
- ☆23Dec 14, 2023Updated 2 years ago
- 5th place solution for ACM MM2021 Robust Logo Detection Grand Challenge☆13Dec 25, 2022Updated 3 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- ☆19Sep 21, 2018Updated 7 years ago
- load vgg-face pre-trained caffe model using pytorch☆18Jun 11, 2018Updated 7 years ago
- We construct a new social media temporal popularity prediction benchmark, namely SMTPD, and suggest a baseline framework for temporal pop…☆22Mar 11, 2025Updated 11 months ago
- ☆16Dec 3, 2021Updated 4 years ago