Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"
☆14Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for CleanSheet
Users that are interested in CleanSheet are comparing it to the libraries listed below
Sorting:
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- [WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability☆18May 30, 2025Updated 9 months ago
- ☆14Jun 6, 2023Updated 2 years ago
- Unsupervised Lifelong Person Re-identification via Contrastive Rehearsal☆11Apr 7, 2022Updated 3 years ago
- PaperPub is an academic arena where diverse AI Agents read papers daily, pick apart each other's arguments, and fiercely debate.☆42Updated this week
- ☆23Dec 14, 2023Updated 2 years ago
- Erlang/OTP MTA (Mail Transfer Agent)☆29Jul 8, 2014Updated 11 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- Color Prompting for Data-Free Continual Unsupervised Domain Adaptive Person Re-Identification☆10Aug 22, 2023Updated 2 years ago
- Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion☆11Apr 1, 2024Updated last year
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- ☆16Jul 11, 2023Updated 2 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- TI-RSLK_小车走迷宫☆14Apr 27, 2019Updated 6 years ago
- ☆27Feb 1, 2023Updated 3 years ago
- ☆13Apr 13, 2025Updated 11 months ago
- Eluding Secure Aggregation in Federated Learning via Model Inconsistency☆13Mar 10, 2023Updated 3 years ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆20Jan 24, 2024Updated 2 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆14Apr 2, 2021Updated 4 years ago
- ☆14Aug 14, 2024Updated last year
- The source codes of TDv2 in paper: TDv2: A Novel Tree-Structured Decoder for Offline Mathematical Expression Recognition.☆12Jul 28, 2022Updated 3 years ago
- Parallel implementation of Graph Convolutional Networks on CPU☆17Jul 3, 2019Updated 6 years ago
- ☆14Oct 6, 2020Updated 5 years ago
- 2019华为软件精英挑战赛☆10Apr 15, 2019Updated 6 years ago
- Awesome Long-CoT Data☆19Mar 26, 2025Updated 11 months ago
- MCSI☆13Nov 2, 2021Updated 4 years ago
- ☆30Jun 28, 2025Updated 8 months ago
- Official Code for FedRule: Federated Rule Recommendation System with Graph Neural Networks☆14Sep 12, 2023Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆33Sep 23, 2023Updated 2 years ago
- Datasets used for NeuralProphet tutorials☆21Jul 7, 2023Updated 2 years ago
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆32Jun 24, 2025Updated 8 months ago
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- Codes of the paper "Time Constrained Continuous Subgraph Search Over Streaming Graphs. ICDE 2019: 1082-1093". Authors: Youhuan Li, Lei Zo…☆12Jun 18, 2021Updated 4 years ago
- ☆11Mar 24, 2023Updated 2 years ago
- A compact toolbox for backdoor attacks and defenses.☆191Jul 16, 2024Updated last year
- [USENIX'23] TPatch: A Triggered Physical Adversarial Patch☆24Aug 8, 2023Updated 2 years ago
- Prototype of a system for metadata-hiding communication for whistleblowers☆20Feb 6, 2020Updated 6 years ago