☆26Jan 25, 2019Updated 7 years ago
Alternatives and similar repositories for backdoor_data_poisoning
Users that are interested in backdoor_data_poisoning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Nov 3, 2018Updated 7 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- A unified benchmark problem for data poisoning attacks☆161Oct 4, 2023Updated 2 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Mar 28, 2020Updated 6 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆39Jul 22, 2024Updated last year
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Apr 1, 2021Updated 5 years ago
- ☆50Aug 30, 2024Updated last year
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆303Aug 25, 2025Updated 8 months ago
- A sybil-resilient distributed learning protocol.☆112Sep 9, 2025Updated 7 months ago
- ☆15Dec 4, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆22Jul 12, 2021Updated 4 years ago
- ConvexPolytopePosioning☆37Jan 10, 2020Updated 6 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆132Oct 24, 2023Updated 2 years ago
- Trojan Attack on Neural Network☆190Mar 25, 2022Updated 4 years ago
- DBA: Distributed Backdoor Attacks against Federated Learning (ICLR 2020)☆205Aug 5, 2021Updated 4 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆67Sep 11, 2021Updated 4 years ago
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆29Jun 29, 2023Updated 2 years ago
- ☆106Oct 19, 2020Updated 5 years ago
- ☆27Oct 17, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆30Dec 31, 2024Updated last year
- This is for the papers I review every week☆14May 20, 2020Updated 5 years ago
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Oct 6, 2018Updated 7 years ago
- Implementation of Boundary Attributions for Normal (Vector) Explanations☆11Aug 13, 2021Updated 4 years ago
- FedDefender is a novel defense mechanism designed to safeguard Federated Learning from the poisoning attacks (i.e., backdoor attacks).☆16Jul 6, 2024Updated last year
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆89Mar 24, 2023Updated 3 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆317Feb 28, 2020Updated 6 years ago
- ☆68Sep 29, 2020Updated 5 years ago
- Source code for paper "How to Backdoor Federated Learning" (https://arxiv.org/abs/1807.00459)☆316Jul 25, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- [ICML 2019] A Robust Meta-Algorithm for Stochastic Optimization☆30Aug 24, 2020Updated 5 years ago
- Code for the AAAI 2021 paper "Attributes-Guided and Pure-Visual Attention Alignment for Few-Shot Recognition".☆10Nov 21, 2022Updated 3 years ago
- Simulation of 802.11 DCF MAC protocol and 802.11 with RTS/CTS☆11Nov 21, 2017Updated 8 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆34Sep 18, 2020Updated 5 years ago
- Related papers for robust machine learning☆562May 25, 2023Updated 2 years ago
- Meta-learning learning rates with higher☆12Sep 27, 2019Updated 6 years ago