SecurityNet-Research / SecurityNet
☆11Updated 5 months ago
Related projects: ⓘ
- Code release for DeepJudge (S&P'22)☆50Updated last year
- ☆73Updated 3 years ago
- ☆20Updated last year
- ☆60Updated 3 years ago
- Code for ML Doctor☆84Updated last month
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆30Updated last year
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated 11 months ago
- ☆41Updated 3 weeks ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆23Updated 2 years ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆47Updated 6 months ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆47Updated 4 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆89Updated last year
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆38Updated 2 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆49Updated last year
- This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks…☆115Updated 2 years ago
- Implementation of https://github.com/PurduePAML/TrojanNN☆9Updated 5 years ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆47Updated 2 years ago
- ☆20Updated 2 years ago
- ☆12Updated 2 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆66Updated 5 months ago
- ☆88Updated 3 years ago
- ☆14Updated 2 years ago
- ☆10Updated 3 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆52Updated last year
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆30Updated last year
- ☆44Updated 3 years ago
- ☆23Updated last year
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆15Updated last year
- ☆11Updated 4 months ago
- Defending against Model Stealing via Verifying Embedded External Features☆31Updated 2 years ago