[ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining
☆19Feb 26, 2025Updated last year
Alternatives and similar repositories for Detect-CLIP-Backdoor-Samples
Users that are interested in Detect-CLIP-Backdoor-Samples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Oct 1, 2022Updated 3 years ago
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆36Oct 29, 2025Updated 5 months ago
- [ICLR 2025] BlueSuffix: Reinforced Blue Teaming for Vision-Language Models Against Jailbreak Attacks☆31Nov 2, 2025Updated 5 months ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆28Feb 8, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Adversarial Examples Detection Benchmark☆17Dec 6, 2024Updated last year
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆14Mar 14, 2022Updated 4 years ago
- ☆34Aug 11, 2022Updated 3 years ago
- The official implementation of CVPR 2025 paper "Invisible Backdoor Attack against Self-supervised Learning"☆17Jul 5, 2025Updated 9 months ago
- [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆26Aug 1, 2025Updated 8 months ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Aug 28, 2021Updated 4 years ago
- ☆18Aug 15, 2022Updated 3 years ago
- Attack-Resilient Image Watermarking Using Stable Diffusion (NeurIPS2024)☆59Dec 5, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [NeurIPS'25] Backdoor Cleaning without External Guidance in MLLM Fine-tuning☆19Oct 13, 2025Updated 5 months ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆22Jul 12, 2021Updated 4 years ago
- ☆17Nov 8, 2024Updated last year
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated last year
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- Dnote TUI with ratatui☆26Apr 1, 2026Updated last week
- ☆16Feb 23, 2025Updated last year
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆32Apr 27, 2022Updated 3 years ago
- [NeurIPS 2025] BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models☆287Mar 13, 2026Updated 3 weeks ago
- Unified Concept Editing in Diffusion Models☆186Dec 7, 2025Updated 4 months ago
- ☆26Dec 1, 2022Updated 3 years ago
- ☆13Apr 3, 2024Updated 2 years ago
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆138Mar 30, 2026Updated last week
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆29Nov 19, 2023Updated 2 years ago
- ☆25Jun 23, 2021Updated 4 years ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆20Aug 10, 2024Updated last year
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification☆16Oct 31, 2023Updated 2 years ago
- MATLAB/Octave generator of Hamming ECC coding. Output format is Verilog HDL.☆12Dec 27, 2022Updated 3 years ago
- A compact toolbox for backdoor attacks and defenses.☆191Jul 16, 2024Updated last year
- A large-scale dataset composed of high-quality synthetic images aimed at evaluating social biases in LVLMs☆13Updated this week
- This is a project based on machine learning and deep learning method for playing Gobang by controlling mechanical arm(利用机械臂下五子棋)☆12Apr 16, 2023Updated 2 years ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆75Sep 4, 2024Updated last year