Huiying-Li / blacklight
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for blacklight
- ☆62Updated 4 years ago
- Code release for DeepJudge (S&P'22)☆51Updated last year
- ☆17Updated 3 years ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆47Updated 2 years ago
- ☆10Updated 3 years ago
- ☆76Updated 3 years ago
- ☆22Updated 3 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆46Updated 6 years ago
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆11Updated 4 months ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆49Updated 5 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- [IEEE S&P 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆17Updated last month
- Implementation of https://github.com/PurduePAML/TrojanNN☆9Updated 5 years ago
- ☆92Updated 4 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆14Updated 6 months ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆31Updated 7 months ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 2 years ago
- ☆14Updated last month
- ☆21Updated last year
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆30Updated this week
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Updated 2 years ago
- ☆25Updated 2 years ago
- ☆13Updated 2 years ago
- Code for ML Doctor☆86Updated 2 months ago
- Code for NDSS 2022 paper "MIRROR: Model Inversion for Deep Learning Network with High Fidelity"☆22Updated last year
- ☆23Updated last year
- TrojanLM: Trojaning Language Models for Fun and Profit☆15Updated 3 years ago
- ☆25Updated last year
- Invisible Backdoor Attack with Sample-Specific Triggers☆88Updated 2 years ago