Data Poisoning in Deep Learning: A Survey
☆22Jan 18, 2026Updated 2 months ago
Alternatives and similar repositories for Data-Poisoning
Users that are interested in Data-Poisoning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CITE: A Corpus of Image-Text Discourse Relations☆13Apr 7, 2019Updated 6 years ago
- A provably secure disambiguating steganography method based on grouping ambiguous pools and synchronous sampling.☆16Apr 24, 2025Updated 11 months ago
- Erlang/OTP MTA (Mail Transfer Agent)☆29Jul 8, 2014Updated 11 years ago
- Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion☆11Apr 1, 2024Updated last year
- This is a refinement edition of TJU Ph.D thesis template.☆15Aug 5, 2022Updated 3 years ago
- TI-RSLK_小车走迷宫☆14Apr 27, 2019Updated 6 years ago
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆21Nov 10, 2025Updated 4 months ago
- AdminLTE +Django + Mysql 的会议室管理系统☆16Feb 10, 2023Updated 3 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- Python基于Django框架图书管理系统毕业源码案例设计☆15May 10, 2023Updated 2 years ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆16Jan 17, 2025Updated last year
- ☆11Oct 10, 2023Updated 2 years ago
- ☆32Jun 28, 2025Updated 8 months ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 4 years ago
- Official PyTorch implementation of the paper "Accelerating Diffusion Large Language Models with SlowFast Sampling: The Three Golden Princ…☆41Jul 18, 2025Updated 8 months ago
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆32Jun 24, 2025Updated 9 months ago
- SAGE disambiguates protocol description in an IETF RFC document, then converts the disambiguated protocol description into executable pro…☆18Aug 9, 2021Updated 4 years ago
- ☆19Feb 25, 2024Updated 2 years ago
- Slime是一个组合众多优秀安全工具的漏扫软件,它将目光集中在安全工具的组合上,而不是自己实现漏扫的某一流程。☆17Sep 9, 2022Updated 3 years ago
- State-based Network AttacK Explorer (SNAKE) code☆14Sep 6, 2019Updated 6 years ago
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆11Jun 2, 2021Updated 4 years ago
- Code and resources for model learning of network protocol implementations☆18Oct 26, 2023Updated 2 years ago
- ☆23Mar 6, 2024Updated 2 years ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- This repository contains the source code, datasets, and scripts for the paper "GenderCARE: A Comprehensive Framework for Assessing and Re…☆27Aug 29, 2024Updated last year
- ☆14Aug 27, 2022Updated 3 years ago
- ☆135Oct 11, 2025Updated 5 months ago
- Python library to access the fatsecret API☆15Nov 4, 2021Updated 4 years ago
- R package for users of data from https://motus.org☆20Feb 2, 2026Updated last month
- Infamous Titanic survial prediction competition on Kaggle☆35May 30, 2021Updated 4 years ago
- Interactive complex analysis through various lens like transformations, vector fields, domain coloring and reimann sphere mapping. Plus v…☆18Feb 24, 2026Updated last month
- Formalisation of a capability machine and principles for reasoning about security properties☆26Mar 12, 2026Updated last week
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆33May 24, 2018Updated 7 years ago
- A system for automated discovery of congestion control attacks on TCP implementations☆19Aug 21, 2018Updated 7 years ago
- A differential fuzzing framework for the QUIC protocol☆19Nov 21, 2023Updated 2 years ago
- CNN-based 2D phase unwrapping for interferometric Synthetic Aperture Radar (SAR) data☆37Sep 10, 2021Updated 4 years ago
- Python module allowing to load the YouTube Faces Database: http://www.cs.tau.ac.il/~wolf/ytfaces☆25Feb 15, 2016Updated 10 years ago
- ☆28Mar 10, 2024Updated 2 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago