☆16Jul 20, 2023Updated 2 years ago
Alternatives and similar repositories for rethinking-backdoor-attacks
Users that are interested in rethinking-backdoor-attacks are comparing it to the libraries listed below
Sorting:
- An Empirical Study of Memorization in NLP (ACL 2022)☆13Jun 22, 2022Updated 3 years ago
- ☆32May 24, 2023Updated 2 years ago
- ☆14Mar 4, 2024Updated last year
- Do input gradients highlight discriminative features? [NeurIPS 2021] (https://arxiv.org/abs/2102.12781)☆13Jan 10, 2023Updated 3 years ago
- ☆36Sep 23, 2022Updated 3 years ago
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Apr 15, 2024Updated last year
- Code for the paper "The Journey, Not the Destination: How Data Guides Diffusion Models"☆25Dec 12, 2023Updated 2 years ago
- ☆23Jan 25, 2024Updated 2 years ago
- ☆23Apr 5, 2023Updated 2 years ago
- Visualization of mean field and neural tangent kernel regime☆23Jul 25, 2024Updated last year
- ☆19Feb 18, 2024Updated 2 years ago
- 这是朴素贝叶斯的代码实现 包括三种模型 高斯模型 多项式模型 伯努利模型☆10Mar 7, 2018Updated 7 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- Debiasing Through Data Attribution☆12May 23, 2024Updated last year
- Code for experiments on self-prediction as a way to measure introspection in LLMs☆16Dec 10, 2024Updated last year
- ☆48Sep 29, 2024Updated last year
- ☆44Nov 17, 2024Updated last year
- Official Repository for Dataset Inference for LLMs☆42Jul 25, 2024Updated last year
- A high performance I/O library for deep learning in Julia, based on the PyTorch WebDataset library☆14Dec 18, 2025Updated 2 months ago
- A Zen approach to configuring your Python project☆15Feb 5, 2026Updated 3 weeks ago
- Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion☆11Apr 1, 2024Updated last year
- The Conceptual Coverage Across Languages Benchmark for Text-to-Image Models☆12Oct 28, 2024Updated last year
- Code for the papers: "Stop Throwing Away Discriminators! Re-using Adversaries for Test-Time Training", Valvano et al., DART 2021; and "Re…☆10Jan 20, 2022Updated 4 years ago
- Official PyTorch implementation for Revisiting LRP: Positional Attribution as the Missing Ingredient for Transformer Explainability [Neur…☆13Jul 7, 2025Updated 7 months ago
- ACL24☆11Jun 7, 2024Updated last year
- Supplementary code for the paper "UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Lear…☆14Nov 10, 2022Updated 3 years ago
- Dataset Interfaces: Diagnosing Model Failures Using Controllable Counterfactual Generation☆45Feb 27, 2023Updated 3 years ago
- Tiny evaluation of leading LLMs on competitive programming problems☆14Nov 28, 2024Updated last year
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- Example code for the NNGeometry PyTorch library☆10Aug 20, 2025Updated 6 months ago
- Code to generate an infinite zoom animation.☆11Nov 9, 2023Updated 2 years ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆49Apr 8, 2024Updated last year
- ☆48May 9, 2024Updated last year
- ☆10Feb 3, 2025Updated last year
- Minimal (truly) muP implementation, consistent with TP4 and TP5 papers notation☆14Jan 2, 2026Updated last month
- ☆12Jul 16, 2025Updated 7 months ago
- This is the official implementation of TAGCOS: Task-agnostic Gradient Clustered Coreset Selection for Instruction Tuning Data☆13Jul 21, 2024Updated last year
- Docker container for ocropus3 OCR system☆12Aug 19, 2018Updated 7 years ago
- ☆15Oct 23, 2023Updated 2 years ago