PKU-ASAL / ReMoS_artifact
☆24Updated 2 years ago
Alternatives and similar repositories for ReMoS_artifact:
Users that are interested in ReMoS_artifact are comparing it to the libraries listed below
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆30Updated 4 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆32Updated last year
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Updated 5 years ago
- ☆79Updated 3 years ago
- ☆31Updated 2 years ago
- Code for "Label-Consistent Backdoor Attacks"☆52Updated 4 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆33Updated 2 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆34Updated last year
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 4 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆54Updated 2 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 2 years ago
- ☆50Updated 3 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆57Updated last year
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆70Updated 6 years ago
- ☆57Updated 2 years ago
- ☆26Updated 2 years ago
- ☆11Updated last year
- ☆13Updated 3 years ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆30Updated 3 years ago
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆23Updated last year
- Paper sharing in adversary related works☆45Updated this week
- This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks…☆122Updated 3 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆54Updated 3 months ago
- KNN Defense Against Clean Label Poisoning Attacks☆12Updated 3 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 2 years ago
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆22Updated last year
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆27Updated 3 years ago
- ☆18Updated last year