Implementations of data poisoning attacks against neural networks and related defenses.
☆104Jul 16, 2024Updated last year
Alternatives and similar repositories for data-poisoning
Users that are interested in data-poisoning are comparing it to the libraries listed below
Sorting:
- A unified benchmark problem for data poisoning attacks☆161Oct 4, 2023Updated 2 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆112Aug 19, 2024Updated last year
- ☆26Dec 14, 2021Updated 4 years ago
- ☆54Sep 11, 2021Updated 4 years ago
- ☆24Jan 27, 2022Updated 4 years ago
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆287Jan 11, 2025Updated last year
- ☆16Jul 17, 2022Updated 3 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆46Apr 15, 2025Updated 10 months ago
- ☆69Feb 17, 2024Updated 2 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 4 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion☆11Apr 1, 2024Updated last year
- ☆10Jul 28, 2022Updated 3 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- Pytorch ImageNet1k Loader with Bounding Boxes.☆13Jan 23, 2022Updated 4 years ago
- ☆23Sep 21, 2022Updated 3 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆135Nov 11, 2024Updated last year
- This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks…☆128Jan 18, 2022Updated 4 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- ☆19Jun 5, 2023Updated 2 years ago
- Code for Data Poisoning Attacks Against Federated Learning Systems☆206Jun 13, 2021Updated 4 years ago
- Code for Active Learning at The ImageNet Scale. This repository implements many popular active learning algorithms and allows training wi…☆54Nov 29, 2021Updated 4 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆133Oct 24, 2023Updated 2 years ago
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Sep 9, 2024Updated last year
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆20Apr 27, 2023Updated 2 years ago
- The official repository of the paper "On the Exploitability of Instruction Tuning".☆70Feb 5, 2024Updated 2 years ago
- The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recogn…☆123May 9, 2023Updated 2 years ago
- Code for "The Intrinsic Dimension of Images and Its Impact on Learning" - ICLR 2021 Spotlight https://openreview.net/forum?id=XJk19XzGq2J☆72Apr 16, 2024Updated last year
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- ☆10Dec 18, 2024Updated last year
- A simple and efficient baseline for data attribution☆11Nov 10, 2023Updated 2 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24May 21, 2022Updated 3 years ago
- Code Repository for the Paper ---Revisiting the Assumption of Latent Separability for Backdoor Defenses (ICLR 2023)☆47Feb 28, 2023Updated 3 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- Pytorch Datasets for Easy-To-Hard☆29Jan 9, 2025Updated last year