Data Poisoning in Deep Learning: A Survey
☆22Jan 18, 2026Updated 3 months ago
Alternatives and similar repositories for Data-Poisoning
Users that are interested in Data-Poisoning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CITE: A Corpus of Image-Text Discourse Relations☆13Apr 7, 2019Updated 7 years ago
- Erlang/OTP MTA (Mail Transfer Agent)☆29Jul 8, 2014Updated 11 years ago
- Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion☆11Apr 1, 2024Updated 2 years ago
- This is a refinement edition of TJU Ph.D thesis template.☆15Aug 5, 2022Updated 3 years ago
- A provably secure disambiguating steganography method based on grouping ambiguous pools and synchronous sampling.☆16Apr 24, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- TI-RSLK_小车走迷宫☆14Apr 27, 2019Updated 7 years ago
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆22Nov 10, 2025Updated 5 months ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- AdminLTE +Django + Mysql 的会议室管理系统☆16Feb 10, 2023Updated 3 years ago
- Python基于Django框架图书管理系统毕业源码案例设计☆15May 10, 2023Updated 2 years ago
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenarios☆17Jan 17, 2025Updated last year
- ☆11Oct 10, 2023Updated 2 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 4 years ago
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆33Jun 24, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Official PyTorch implementation of the paper "Accelerating Diffusion Large Language Models with SlowFast Sampling: The Three Golden Princ…☆42Jul 18, 2025Updated 9 months ago
- SAGE disambiguates protocol description in an IETF RFC document, then converts the disambiguated protocol description into executable pro…☆19Aug 9, 2021Updated 4 years ago
- ☆19Feb 25, 2024Updated 2 years ago
- Slime是一个组合众多优秀安全工具的漏扫软件,它将目光集中在安全工具的组合上,而不是自己实现漏扫的某一流程。☆17Sep 9, 2022Updated 3 years ago
- State-based Network AttacK Explorer (SNAKE) code☆14Sep 6, 2019Updated 6 years ago
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆12Jun 2, 2021Updated 4 years ago
- Code and resources for model learning of network protocol implementations☆18Oct 26, 2023Updated 2 years ago
- Skill-Inject: Measuring Agent Vulnerability to Skill File Attacks☆66Apr 8, 2026Updated 3 weeks ago
- ☆35Jun 28, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scripts for examples in the lectures notes for Optimal Control and Estimation☆12Nov 14, 2023Updated 2 years ago
- ☆29Mar 6, 2024Updated 2 years ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- ☆14Aug 27, 2022Updated 3 years ago
- This repository contains the source code, datasets, and scripts for the paper "GenderCARE: A Comprehensive Framework for Assessing and Re…☆27Aug 29, 2024Updated last year
- ☆136Apr 2, 2026Updated last month
- R package for users of data from https://motus.org☆21Feb 2, 2026Updated 3 months ago
- Python library to access the fatsecret API☆15Nov 4, 2021Updated 4 years ago
- Interactive complex analysis through various lens like transformations, vector fields, domain coloring and reimann sphere mapping. Plus v…☆22Apr 27, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Formalisation of a capability machine and principles for reasoning about security properties☆27Mar 12, 2026Updated last month
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆33May 24, 2018Updated 7 years ago
- Infamous Titanic survial prediction competition on Kaggle☆35May 30, 2021Updated 4 years ago
- A system for automated discovery of congestion control attacks on TCP implementations☆19Aug 21, 2018Updated 7 years ago
- A differential fuzzing framework for the QUIC protocol☆19Nov 21, 2023Updated 2 years ago
- CNN-based 2D phase unwrapping for interferometric Synthetic Aperture Radar (SAR) data☆37Sep 10, 2021Updated 4 years ago
- Python module allowing to load the YouTube Faces Database: http://www.cs.tau.ac.il/~wolf/ytfaces☆25Feb 15, 2016Updated 10 years ago