☆16Jul 20, 2023Updated 2 years ago
Alternatives and similar repositories for rethinking-backdoor-attacks
Users that are interested in rethinking-backdoor-attacks are comparing it to the libraries listed below
Sorting:
- Minimal, standalone library for solving GLMs in PyTorch☆27Nov 18, 2021Updated 4 years ago
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Apr 15, 2024Updated last year
- ModelDiff: A Framework for Comparing Learning Algorithms☆58Aug 15, 2023Updated 2 years ago
- ☆14Mar 4, 2024Updated 2 years ago
- Code for the paper "The Journey, Not the Destination: How Data Guides Diffusion Models"☆25Dec 12, 2023Updated 2 years ago
- An Empirical Study of Memorization in NLP (ACL 2022)☆13Jun 22, 2022Updated 3 years ago
- ☆35Sep 23, 2022Updated 3 years ago
- MIT MIC Reading Groups☆17Apr 13, 2021Updated 4 years ago
- ☆23Jan 25, 2024Updated 2 years ago
- Evaluating methods to improve model transfer for intensive care unit models☆16Jul 6, 2023Updated 2 years ago
- A TinyStories LM with SAEs and transcoders☆14Apr 3, 2025Updated 11 months ago
- ☆11Nov 8, 2023Updated 2 years ago
- A pytorch toolbox designed for experimentation using a generalization of the Resnet design.☆15Jul 6, 2023Updated 2 years ago
- Listwise Learning to Rank by Exploring Unique Ratings (WSDM 2020)☆13Nov 2, 2025Updated 4 months ago
- Code for "Mind Your Inflections! Improving NLP for Non-Standard Englishes with Base-Inflection Encoding" (EMNLP 2020).☆11May 1, 2025Updated 10 months ago
- Code for the papers: "Stop Throwing Away Discriminators! Re-using Adversaries for Test-Time Training", Valvano et al., DART 2021; and "Re…☆10Jan 20, 2022Updated 4 years ago
- [NeurIPS 2021] “When does Contrastive Learning Preserve Adversarial Robustness from Pretraining to Finetuning?”☆48Nov 21, 2021Updated 4 years ago
- Implementation of Boundary Attributions for Normal (Vector) Explanations☆11Aug 13, 2021Updated 4 years ago
- https://footprints.baulab.info☆18Oct 4, 2024Updated last year
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- ☆23Apr 5, 2023Updated 2 years ago
- ☆11Dec 23, 2018Updated 7 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- 这是朴素贝叶斯的代码实现 包括三种模型 高斯模型 多项式模型 伯努利模型☆10Mar 7, 2018Updated 8 years ago
- A comparison of human attention with computational attention mechanisms☆12Jul 3, 2020Updated 5 years ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆49Apr 8, 2024Updated last year
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- ☆19Feb 18, 2024Updated 2 years ago
- ☆13Nov 29, 2021Updated 4 years ago
- ☆20Jun 2, 2023Updated 2 years ago
- PyTroch Implementation of the following paper, "ECACL: A Holistic Framework for Semi-Supervised Domain Adaptation, ICCV'21""☆16Jul 19, 2022Updated 3 years ago
- ☆51Jan 24, 2024Updated 2 years ago
- A list of research towards security&privacy in AI-Generated Content☆16Jan 10, 2025Updated last year
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- ☆12Jul 17, 2023Updated 2 years ago
- ARMA cell: a modular and effective approach for neural autoregressive modeling☆17May 29, 2024Updated last year
- ☆17Jun 17, 2025Updated 9 months ago
- ☆15Dec 10, 2024Updated last year
- ☆15Oct 23, 2023Updated 2 years ago