☆26Jan 25, 2019Updated 7 years ago
Alternatives and similar repositories for backdoor_data_poisoning
Users that are interested in backdoor_data_poisoning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Nov 3, 2018Updated 7 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- A unified benchmark problem for data poisoning attacks☆162Oct 4, 2023Updated 2 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Mar 28, 2020Updated 6 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆39Jul 22, 2024Updated last year
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Apr 1, 2021Updated 5 years ago
- ☆50Aug 30, 2024Updated last year
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆303Aug 25, 2025Updated 7 months ago
- A sybil-resilient distributed learning protocol.☆112Sep 9, 2025Updated 7 months ago
- ☆15Dec 4, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆22Jul 12, 2021Updated 4 years ago
- ConvexPolytopePosioning☆37Jan 10, 2020Updated 6 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆132Oct 24, 2023Updated 2 years ago
- Trojan Attack on Neural Network☆190Mar 25, 2022Updated 4 years ago
- DBA: Distributed Backdoor Attacks against Federated Learning (ICLR 2020)☆204Aug 5, 2021Updated 4 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆67Sep 11, 2021Updated 4 years ago
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆29Jun 29, 2023Updated 2 years ago
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- ☆103Oct 19, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆27Oct 17, 2022Updated 3 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Dec 31, 2024Updated last year
- This is for the papers I review every week☆14May 20, 2020Updated 5 years ago
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Oct 6, 2018Updated 7 years ago
- Implementation of Boundary Attributions for Normal (Vector) Explanations☆11Aug 13, 2021Updated 4 years ago
- FedDefender is a novel defense mechanism designed to safeguard Federated Learning from the poisoning attacks (i.e., backdoor attacks).☆15Jul 6, 2024Updated last year
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆89Mar 24, 2023Updated 3 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆315Feb 28, 2020Updated 6 years ago
- ☆68Sep 29, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Source code for paper "How to Backdoor Federated Learning" (https://arxiv.org/abs/1807.00459)☆314Jul 25, 2024Updated last year
- DropNet: Reducing Neural Network Complexity via Iterative Pruning (ICML 2020)☆16Aug 24, 2020Updated 5 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- [ICML 2019] A Robust Meta-Algorithm for Stochastic Optimization☆30Aug 24, 2020Updated 5 years ago
- Code for the AAAI 2021 paper "Attributes-Guided and Pure-Visual Attention Alignment for Few-Shot Recognition".☆10Nov 21, 2022Updated 3 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆34Sep 18, 2020Updated 5 years ago
- Related papers for robust machine learning☆562May 25, 2023Updated 2 years ago