FuChong-cyber / Data-Free-Neural-Backdoor-Detector-FreeEagleView external linksLinks
A data-free backdoor detector for deep neural networks
☆21Mar 8, 2023Updated 2 years ago
Alternatives and similar repositories for Data-Free-Neural-Backdoor-Detector-FreeEagle
Users that are interested in Data-Free-Neural-Backdoor-Detector-FreeEagle are comparing it to the libraries listed below
Sorting:
- 下载vgg face dataset的脚本☆14Aug 22, 2017Updated 8 years ago
- The official PyTorch Implementation of MetaSense (MetaSense: Few-Shot Adaptation to Untrained Conditions in Deep Mobile Sensing, ACM SenS…☆17Oct 12, 2022Updated 3 years ago
- BackdoorMBTI is an open source project expanding the unimodal backdoor learning to a multimodal context. We hope that BackdoorMBTI can fa…☆25Aug 17, 2025Updated 5 months ago
- ☆27Nov 9, 2022Updated 3 years ago
- One-shot Recognition for Unseen Gesture with COTS WiFi☆40Jun 6, 2022Updated 3 years ago
- Dart library to parse FIDO2 request / response and interactive with FIDO2 (CTAP) authenticators.☆14Sep 9, 2025Updated 5 months ago
- A simple implementation of BadNets on MNIST☆33Jul 29, 2019Updated 6 years ago
- ☆12Nov 2, 2024Updated last year
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- LLM驱动的社交网络模拟系统; LLM-driven social network simulation system☆10Oct 13, 2024Updated last year
- Docker container exposing a preconfigured python environment for Social Network Analysis☆14Feb 4, 2023Updated 3 years ago
- Compute surface normal from depth image using d2nt and cross product method☆10Aug 3, 2023Updated 2 years ago
- PyTorch project example for DL-DIY course at Ecole Polytechnique☆12Feb 25, 2020Updated 5 years ago
- 这个仓库用来存储潦草学者文章的附录文件,欢迎下载使用。☆25Jan 13, 2026Updated last month
- Code for "Live Trojan Attacks on Deep Neural Networks" paper☆10May 8, 2020Updated 5 years ago
- 无线感知相关论文☆11Oct 26, 2021Updated 4 years ago
- Corpus of Black Lives Matters and counter protests tweets☆14Dec 22, 2022Updated 3 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆200Apr 10, 2023Updated 2 years ago
- Trojan Attack on Neural Network☆191Mar 25, 2022Updated 3 years ago
- DeepIC3: Guiding IC3 Algorithms by Graph Neural Network Clause Prediction (ASP-DAC 2024)☆13Nov 2, 2023Updated 2 years ago
- ☆53Jan 7, 2022Updated 4 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated last year
- ☆11Dec 16, 2024Updated last year
- ☆13Jun 1, 2024Updated last year
- ☆14May 7, 2022Updated 3 years ago
- ☆53Feb 26, 2023Updated 2 years ago
- ☆11May 17, 2024Updated last year
- Incredible acceleration with pruning or the other compression techniques☆13Jul 7, 2021Updated 4 years ago
- ☆13May 1, 2024Updated last year
- ☆581Jul 4, 2025Updated 7 months ago
- ☆15Jul 24, 2021Updated 4 years ago
- ☆21Dec 14, 2023Updated 2 years ago
- PyTorch implementation of "Pruning Filters For Efficient ConvNets"☆16Sep 28, 2021Updated 4 years ago
- We construct a new social media temporal popularity prediction benchmark, namely SMTPD, and suggest a baseline framework for temporal pop…☆22Mar 11, 2025Updated 11 months ago
- This is the repository for USENIX Security 2023 paper "Hard-label Black-box Universal Adversarial Patch Attack".☆15Sep 5, 2023Updated 2 years ago
- It demonstrates the example of text classification and text clustering using K-NN and K-Means models based on tf-idf features.☆16Jan 18, 2018Updated 8 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- Placeholder repository☆15Mar 16, 2022Updated 3 years ago
- ☆21Jun 20, 2024Updated last year