Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"
☆14Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for CleanSheet
Users that are interested in CleanSheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- [WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability☆18May 30, 2025Updated 10 months ago
- ☆14Jun 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Unsupervised Lifelong Person Re-identification via Contrastive Rehearsal☆11Apr 7, 2022Updated 4 years ago
- ☆23Dec 14, 2023Updated 2 years ago
- PaperPub is an academic arena where diverse AI Agents read papers daily, pick apart each other's arguments, and fiercely debate.☆43Mar 25, 2026Updated 2 weeks ago
- Erlang/OTP MTA (Mail Transfer Agent)☆29Jul 8, 2014Updated 11 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- Color Prompting for Data-Free Continual Unsupervised Domain Adaptive Person Re-Identification☆10Aug 22, 2023Updated 2 years ago
- Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion☆11Apr 1, 2024Updated 2 years ago
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- ☆16Jul 11, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- TI-RSLK_小车走迷宫☆14Apr 27, 2019Updated 6 years ago
- ☆27Feb 1, 2023Updated 3 years ago
- Data Poisoning in Deep Learning: A Survey☆22Jan 18, 2026Updated 2 months ago
- ☆13Apr 13, 2025Updated 11 months ago
- Eluding Secure Aggregation in Federated Learning via Model Inconsistency☆13Mar 10, 2023Updated 3 years ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆20Jan 24, 2024Updated 2 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆14Apr 2, 2021Updated 5 years ago
- ☆14Aug 14, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The source codes of TDv2 in paper: TDv2: A Novel Tree-Structured Decoder for Offline Mathematical Expression Recognition.☆12Jul 28, 2022Updated 3 years ago
- Parallel implementation of Graph Convolutional Networks on CPU☆17Jul 3, 2019Updated 6 years ago
- ☆14Oct 6, 2020Updated 5 years ago
- 2019华为软件精英挑战赛☆10Apr 15, 2019Updated 6 years ago
- Awesome Long-CoT Data☆20Mar 26, 2025Updated last year
- MCSI☆13Nov 2, 2021Updated 4 years ago
- Official Code for FedRule: Federated Rule Recommendation System with Graph Neural Networks☆14Sep 12, 2023Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆33Sep 23, 2023Updated 2 years ago
- Datasets used for NeuralProphet tutorials☆21Jul 7, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆33Jun 24, 2025Updated 9 months ago
- Codes of the paper "Time Constrained Continuous Subgraph Search Over Streaming Graphs. ICDE 2019: 1082-1093". Authors: Youhuan Li, Lei Zo…☆12Jun 18, 2021Updated 4 years ago
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- ☆11Mar 24, 2023Updated 3 years ago
- A compact toolbox for backdoor attacks and defenses.☆191Jul 16, 2024Updated last year
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Aug 8, 2023Updated 2 years ago
- Prototype of a system for metadata-hiding communication for whistleblowers☆20Feb 6, 2020Updated 6 years ago