Official implementation of "Label Poisoning is All You Need".
☆11Jan 4, 2024Updated 2 years ago
Alternatives and similar repositories for FLIP
Users that are interested in FLIP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆28Apr 15, 2025Updated 11 months ago
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- Minimalistic Growth16 snark system.☆10Jul 18, 2023Updated 2 years ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆12Jan 3, 2026Updated 2 months ago
- [CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"☆14Oct 29, 2025Updated 4 months ago
- ☆12Mar 5, 2024Updated 2 years ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Jan 15, 2025Updated last year
- an exercise for the solidity-study-group☆11Sep 1, 2023Updated 2 years ago
- Injecting watermarks to protein sequences for privacy protection in biosecurity☆10Oct 1, 2024Updated last year
- Official codes for "Understanding Deep Gradient Leakage via Inversion Influence Functions", NeurIPS 2023☆15Oct 13, 2023Updated 2 years ago
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- ☆24Feb 24, 2021Updated 5 years ago
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- Pulsar: Secure Steganography for Diffusion Models☆15Oct 15, 2024Updated last year
- ☆19Mar 26, 2022Updated 3 years ago
- 数据库大作业,简易的CRUD图书管理系统,Python☆10Jul 14, 2020Updated 5 years ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆52Jan 19, 2026Updated 2 months ago
- ☆20Aug 7, 2023Updated 2 years ago
- This repository contains PyTorch implementation of the paper ''LFighter: Defending against Label-flipping Attacks in Federated Learning''…☆18Mar 6, 2026Updated 2 weeks ago
- ☆10Oct 27, 2023Updated 2 years ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- Polytonic Greek OCR tool suite based on Ocropus 0.7☆13Jul 5, 2023Updated 2 years ago
- PyTorch implementation of our paper, "Revisiting Hierarchical Approach for Persistent Long-Term Video Prediction."☆21Feb 10, 2021Updated 5 years ago
- Framework to achieve context distillation in LLMs☆15Nov 24, 2023Updated 2 years ago
- Official PyTorch Implementation of PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection (CVPR 2025).☆34Jul 7, 2025Updated 8 months ago
- ☆16Apr 10, 2024Updated last year
- [PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Feb 27, 2021Updated 5 years ago
- Repository for Diffusion in the Dark (WACV 2024)☆25Nov 6, 2023Updated 2 years ago
- Code and data for the ACL2024 paper "InstructProtein: Aligning Human and Protein Language via Knowledge Instruction".☆23Aug 28, 2024Updated last year
- ☆25May 16, 2023Updated 2 years ago
- Memory-optimized training scripts for video models based on Diffusers☆14Jan 3, 2025Updated last year
- Feature partitioner by imbalance or correlation (ICLR 2024)☆17Feb 27, 2026Updated 3 weeks ago
- Official repository for CVPR2023 publication, GEN: Pushing the Limits of Softmax-Based Out-of-Distribution Detection☆19Sep 25, 2024Updated last year
- ☆19Sep 8, 2023Updated 2 years ago
- PyTorch-Implementation of "Data-Driven Sparse Structure Selection for Deep Neural Networks"☆21Apr 17, 2020Updated 5 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Apr 5, 2022Updated 3 years ago
- FedShare: Secure Aggregation based on Additive Secret Sharing in Federated Learning☆21Jan 15, 2026Updated 2 months ago
- [AAAI 2025] Label-Free Backdoor Attacks in Vertical Federated Learning☆20Apr 14, 2025Updated 11 months ago
- Code for the paper "Adversarial Neural Pruning with Latent Vulnerability Suppression"☆15Nov 23, 2022Updated 3 years ago