SecurityNet-Research / SecurityNet
☆13Updated 11 months ago
Alternatives and similar repositories for SecurityNet:
Users that are interested in SecurityNet are comparing it to the libraries listed below
- Code for ML Doctor☆88Updated 7 months ago
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- ☆24Updated 2 years ago
- ☆64Updated 4 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆33Updated last year
- ☆24Updated 3 years ago
- ☆80Updated 3 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆25Updated last year
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆50Updated 2 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆34Updated last year
- ☆28Updated 6 months ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆55Updated 4 months ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- ☆18Updated last year
- ☆24Updated 2 years ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆86Updated 5 months ago
- ☆10Updated 3 years ago
- competition☆17Updated 4 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆71Updated last year
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆22Updated last year
- ☆18Updated 2 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆18Updated 2 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆18Updated last month
- Defending against Model Stealing via Verifying Embedded External Features☆36Updated 3 years ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Updated 3 years ago
- ☆18Updated 3 years ago
- ☆45Updated 4 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆19Updated 4 months ago
- ☆17Updated 6 months ago