JarryShaw / 8086
Homework Codes in 8086 (Assembly Language) | HW from COA
☆7Updated 7 years ago
Alternatives and similar repositories for 8086:
Users that are interested in 8086 are comparing it to the libraries listed below
- ☆33Updated 2 years ago
- ☆101Updated 5 years ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆48Updated 11 months ago
- A simple implementation of BadNets on MNIST☆32Updated 5 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Updated 3 years ago
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆71Updated 2 years ago
- Source code and scripts for the paper "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks"☆17Updated 3 months ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆28Updated 3 months ago
- ☆26Updated 3 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- [ICLR 2025] BlueSuffix: Reinforced Blue Teaming for Vision-Language Models Against Jailbreak Attacks☆16Updated last week
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆23Updated 3 years ago
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆30Updated 2 years ago
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆17Updated 5 months ago
- ☆43Updated 7 months ago
- ☆88Updated 3 years ago
- Fingerprint large language models☆30Updated 8 months ago
- ☆12Updated 10 months ago
- ☆25Updated 3 years ago
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆22Updated last year
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆16Updated last week
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆14Updated 3 weeks ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆11Updated 3 years ago
- [TDSC 2024] Official code for our paper "FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model"☆14Updated 3 months ago
- ☆15Updated 3 years ago
- UIUC CS 440 / ECE 448 Artificial Intelligence☆13Updated 5 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆57Updated last year
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆33Updated last year
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆55Updated 3 months ago