SecurityNet-Research / SecurityNetLinks
☆13Updated last year
Alternatives and similar repositories for SecurityNet
Users that are interested in SecurityNet are comparing it to the libraries listed below
Sorting:
- Code for ML Doctor☆92Updated last year
- Code release for DeepJudge (S&P'22)☆52Updated 2 years ago
- ☆68Updated 5 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Updated 2 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆114Updated 3 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Updated 7 months ago
- ☆83Updated 4 years ago
- ☆37Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆58Updated last year
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Updated last year
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated 7 months ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Updated 11 months ago
- Papers I have collected and read in undergraduate and graduate period☆54Updated 2 years ago
- This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks…☆127Updated 4 years ago
- ☆101Updated 5 years ago
- Code Repository for the Paper ---Revisiting the Assumption of Latent Separability for Backdoor Defenses (ICLR 2023)☆47Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆34Updated 2 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Updated last year
- ☆17Updated last year
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆51Updated 3 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆111Updated last year
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆193Updated 3 years ago
- A unified benchmark problem for data poisoning attacks☆161Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆61Updated last year
- Reference implementation of the PRADA model stealing defense. IEEE Euro S&P 2019.☆35Updated 6 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆35Updated 2 years ago
- ☆26Updated 3 years ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆113Updated last year
- A curated list of trustworthy Generative AI papers. Daily updating...☆75Updated last year
- ☆27Updated 3 years ago