☆13Jul 26, 2021Updated 4 years ago
Alternatives and similar repositories for Targeted-Backdoor-Attacks-on-Deep-Learning-Systems-Using-Data-Poisoning-
Users that are interested in Targeted-Backdoor-Attacks-on-Deep-Learning-Systems-Using-Data-Poisoning- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆21Jun 3, 2020Updated 5 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Feb 5, 2021Updated 5 years ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆21Sep 29, 2022Updated 3 years ago
- Code for paper 'FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis'☆39Sep 12, 2022Updated 3 years ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆13May 14, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Jan 25, 2022Updated 4 years ago
- This is an implementation of the paper: "Deep learning to detect botnet via network flow summaries" using Keras.☆11Mar 30, 2020Updated 6 years ago
- Attention-Enhanced Short-Time Wiener Solution for Acoustic Echo Cancellation☆26Nov 12, 2025Updated 4 months ago
- ☆13Sep 21, 2019Updated 6 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 3 years ago
- PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents (TDSC 2024)☆19Mar 29, 2024Updated 2 years ago
- A collection of papers and libraries for performing multi-agent optimization☆18Feb 7, 2026Updated last month
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆62Nov 12, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- repository to research & share the "machine learning & security" articles☆20Jun 25, 2018Updated 7 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆22Aug 24, 2021Updated 4 years ago
- A kalilinux/kali-rolling container with extra juice.☆20Jan 5, 2026Updated 2 months ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- Embedder with binary sparse distributed representation.☆20May 15, 2025Updated 10 months ago
- ☆13Sep 26, 2024Updated last year
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- Robust PCA: PCP, Stable PCP, PCP with compressed data, IRCUR☆12Dec 19, 2021Updated 4 years ago
- [ICCV 2023] The official PyTorch implementation of the Iterated Integrated Attributions (IIA) method.☆14Mar 13, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Jun 17, 2024Updated last year
- ☆16Feb 23, 2025Updated last year
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- Code for AAAI 2021 Paper "Membership Privacy for Machine Learning Models Through Knowledge Transfer"☆11Apr 5, 2021Updated 4 years ago
- A summay of existing works on vertical federated/split learning☆15Nov 28, 2021Updated 4 years ago
- THU-AIR 联邦学习隐私与安全☆13Jun 26, 2023Updated 2 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- ☆29May 21, 2025Updated 10 months ago
- List of papers on cryptography assisted deep learning privacy computation☆18Dec 29, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- [PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Feb 27, 2021Updated 5 years ago
- ☆20May 6, 2022Updated 3 years ago
- Data-Efficient Backdoor Attacks☆20Jun 15, 2022Updated 3 years ago
- A repo to download and preprocess the Purchase100 dataset extracted from Kaggle: Acquire Valued Shoppers Challenge☆12Jun 21, 2021Updated 4 years ago
- Subgraphormer: Unifying Subgraph GNNs and Graph Transformers via Graph Products (ICML 2024)☆11Jul 13, 2024Updated last year
- The code and data for Dynamic Malware Analysis with Feature Engineering and Feature Learning.☆33Dec 9, 2024Updated last year
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16May 19, 2025Updated 10 months ago