☆13Jul 26, 2021Updated 4 years ago
Alternatives and similar repositories for Targeted-Backdoor-Attacks-on-Deep-Learning-Systems-Using-Data-Poisoning-
Users that are interested in Targeted-Backdoor-Attacks-on-Deep-Learning-Systems-Using-Data-Poisoning- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆21Jun 3, 2020Updated 5 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Feb 5, 2021Updated 5 years ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆21Sep 29, 2022Updated 3 years ago
- Code for paper 'FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis'☆39Sep 12, 2022Updated 3 years ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆13May 14, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11Jan 25, 2022Updated 4 years ago
- This is an implementation of the paper: "Deep learning to detect botnet via network flow summaries" using Keras.☆11Mar 30, 2020Updated 6 years ago
- Attention-Enhanced Short-Time Wiener Solution for Acoustic Echo Cancellation☆26Nov 12, 2025Updated 5 months ago
- ☆13Sep 21, 2019Updated 6 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 4 years ago
- PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents (TDSC 2024)☆20Mar 29, 2024Updated 2 years ago
- A collection of papers and libraries for performing multi-agent optimization☆18Feb 7, 2026Updated 2 months ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆62Nov 12, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- repository to research & share the "machine learning & security" articles☆20Jun 25, 2018Updated 7 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆22Aug 24, 2021Updated 4 years ago
- A kalilinux/kali-rolling container with extra juice.☆20Jan 5, 2026Updated 3 months ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- Embedder with binary sparse distributed representation.☆20May 15, 2025Updated 11 months ago
- ☆13Sep 26, 2024Updated last year
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- Robust PCA: PCP, Stable PCP, PCP with compressed data, IRCUR☆12Dec 19, 2021Updated 4 years ago
- [ICCV 2023] The official PyTorch implementation of the Iterated Integrated Attributions (IIA) method.☆14Mar 13, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Jun 17, 2024Updated last year
- ☆16Feb 23, 2025Updated last year
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- Code for AAAI 2021 Paper "Membership Privacy for Machine Learning Models Through Knowledge Transfer"☆11Apr 5, 2021Updated 5 years ago
- A summay of existing works on vertical federated/split learning☆15Nov 28, 2021Updated 4 years ago
- THU-AIR 联邦学习隐私与安全☆13Jun 26, 2023Updated 2 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- [PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Feb 27, 2021Updated 5 years ago
- List of papers on cryptography assisted deep learning privacy computation☆18Apr 1, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆20May 6, 2022Updated 3 years ago
- Data-Efficient Backdoor Attacks☆20Jun 15, 2022Updated 3 years ago
- A repo to download and preprocess the Purchase100 dataset extracted from Kaggle: Acquire Valued Shoppers Challenge☆12Jun 21, 2021Updated 4 years ago
- Subgraphormer: Unifying Subgraph GNNs and Graph Transformers via Graph Products (ICML 2024)☆11Jul 13, 2024Updated last year
- The code and data for Dynamic Malware Analysis with Feature Engineering and Feature Learning.☆33Dec 9, 2024Updated last year
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16May 19, 2025Updated 11 months ago
- ☆21Mar 26, 2017Updated 9 years ago