Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"
☆14Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for CleanSheet
Users that are interested in CleanSheet are comparing it to the libraries listed below
Sorting:
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- ☆14Jun 6, 2023Updated 2 years ago
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- ☆22Dec 14, 2023Updated 2 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- Eluding Secure Aggregation in Federated Learning via Model Inconsistency☆13Mar 10, 2023Updated 2 years ago
- [WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability☆18May 30, 2025Updated 9 months ago
- ☆27Feb 1, 2023Updated 3 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆20Jan 24, 2024Updated 2 years ago
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Aug 8, 2023Updated 2 years ago
- ☆26Dec 14, 2021Updated 4 years ago
- A robotframework library that repairs failing Robot Framework tests automatically via AI☆21Feb 5, 2026Updated 3 weeks ago
- ☆11Dec 23, 2024Updated last year
- ☆35Oct 4, 2021Updated 4 years ago
- ☆12May 6, 2022Updated 3 years ago
- TI-RSLK_小车走迷宫☆14Apr 27, 2019Updated 6 years ago
- Real-Time Network Intrusion Detection Framework☆13Mar 21, 2025Updated 11 months ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆33Sep 23, 2023Updated 2 years ago
- ☆37Feb 7, 2024Updated 2 years ago
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆41Apr 3, 2023Updated 2 years ago
- Veri yapıları dersi 2022☆10Jan 7, 2023Updated 3 years ago
- [TDSC 2025] Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors☆14Aug 12, 2025Updated 6 months ago
- ☆14May 17, 2024Updated last year
- Learn OpenCV : C++ and Python Examples☆10Mar 14, 2019Updated 6 years ago
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 10 months ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Dec 24, 2023Updated 2 years ago
- UCI's first women-centric hackathon!☆11Updated this week
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆109Sep 27, 2024Updated last year
- Landing page for a studio built with Nextjs, GSAP and framer-motion☆15Jan 18, 2026Updated last month
- todo: desc☆11Aug 12, 2021Updated 4 years ago
- Çeşitli kütüphaneler kullanılarak Türkçe kod açıklamalarıyla pratik derin öğrenme uygulamaları.☆10Nov 20, 2017Updated 8 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- Secure Inference Resilient Against Malicious Clients☆15May 3, 2022Updated 3 years ago
- 🧟 The hackathon where 150 teens built fun tech to survive the zombie apocalypse.☆13Mar 14, 2025Updated 11 months ago
- Code for AISTATS'25 paper - On the Power of Adaptive Weighted Aggregation in Heterogeneous Federated Learning and Beyond☆13Sep 23, 2025Updated 5 months ago