[AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models
☆12Dec 5, 2024Updated last year
Alternatives and similar repositories for DataElixir
Users that are interested in DataElixir are comparing it to the libraries listed below
Sorting:
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆45Updated this week
- Codes for Dual Stealthy Backdoor☆14Feb 10, 2024Updated 2 years ago
- ☆16Jun 25, 2025Updated 8 months ago
- ☆15Apr 7, 2023Updated 2 years ago
- [CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"☆14Oct 29, 2025Updated 4 months ago
- Turbo是一套快速开发框架,打造适合于未来趋势企业级应用开发一站式解决方案。Turbo is a rapid development framework designed to create a one-stop solution for enterprise-level…☆17May 10, 2025Updated 10 months ago
- This repository contains my implementation of the research paper "Delay-Tolerant Network Routing as a Machine Learning Classification Pro…☆12Jul 15, 2021Updated 4 years ago
- The code of the ICLR 2024 paper: Adversarial Training on Purification (AToP): Advancing Both Robustness and Generalization☆10Nov 21, 2024Updated last year
- This is the official implementation of ICLR 2024 paper "VDC: Versatile Data Cleanser based on Visual-Linguistic Inconsistency by Multimod…☆19Feb 24, 2025Updated last year
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated last year
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆52Jun 18, 2025Updated 9 months ago
- A music composer and player with MATLAB☆11Mar 14, 2020Updated 6 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- ☆38Feb 1, 2026Updated last month
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- List of papers on cryptography assisted deep learning privacy computation☆17Dec 29, 2025Updated 2 months ago
- Pytorch implementation of backdoor unlearning.☆21Jun 8, 2022Updated 3 years ago
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification☆16Oct 31, 2023Updated 2 years ago
- Code for CVPR2018 "Iterative Learning with Open-set Noisy Labels"☆12Mar 12, 2021Updated 5 years ago
- [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆26Aug 1, 2025Updated 7 months ago
- ☆27Feb 1, 2023Updated 3 years ago
- [ICML 2022 Spotlight] Finding the Task-Optimal Low-Bit Sub-Distribution in Deep Neural Networks☆11May 21, 2023Updated 2 years ago
- ☆12Jun 10, 2025Updated 9 months ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆21Sep 29, 2022Updated 3 years ago
- Official Code for ICLR 2023 Paper: A Message Passing Perspective on Learning Dynamics of Contrastive Learning☆11Mar 9, 2023Updated 3 years ago
- PDM-based Purifier☆22Nov 5, 2024Updated last year
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 7 months ago
- Official Implementation of ICCV 2025 paper "ForgeLens: Data-Efficient Forgery Focus for Generalizable Forgery Image Detection"☆31Nov 9, 2025Updated 4 months ago
- [ICML 2024] Fool Your (Vision and) Language Model With Embarrassingly Simple Permutations☆15Oct 28, 2023Updated 2 years ago
- A repo recording: How I use UNet to solve problems☆22Nov 6, 2024Updated last year
- RelayGS: Reconstructing Dynamic Scenes with Large-Scale and Complex Motions via Relay Gaussians☆14Dec 5, 2024Updated last year
- Implementation of "Novel view synthesis with Diffusion models" by Google in JAX distributed☆11May 25, 2023Updated 2 years ago
- ☆18Mar 24, 2023Updated 2 years ago
- Adult Image Classification by a local-context aware network☆18Jan 11, 2018Updated 8 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- Source code of the paper "The NeRF Signature: Codebook-Aided Watermarking for Neural Radiance Fields".☆17Mar 3, 2025Updated last year
- Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"☆33Feb 28, 2022Updated 4 years ago