FuChong-cyber / Data-Free-Neural-Backdoor-Detector-FreeEagle
A data-free backdoor detector for deep neural networks
☆12Updated last year
Related projects: ⓘ
- Invisible Backdoor Attack with Sample-Specific Triggers☆85Updated 2 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆23Updated 3 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Updated 5 years ago
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Updated 5 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆99Updated last year
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆47Updated 4 years ago
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆26Updated 2 years ago
- ☆17Updated 2 years ago
- Implementation of badnets on CIFAR10 and MNIST☆9Updated 3 years ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆47Updated 2 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆18Updated 3 years ago
- This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks…☆115Updated 2 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆28Updated 3 months ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆27Updated 11 months ago
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆29Updated 3 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆141Updated last year
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆111Updated last month
- ☆24Updated last year
- Paper list of Adversarial Examples☆42Updated 11 months ago
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆12Updated 4 months ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆114Updated 10 months ago
- ☆73Updated 3 years ago
- ☆17Updated 2 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆12Updated 3 years ago
- ☆11Updated 3 months ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆34Updated last year
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆67Updated 6 years ago
- Code for "Label-Consistent Backdoor Attacks"☆48Updated 3 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆30Updated last year
- The implement of paper "How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN…☆23Updated 3 years ago