SoftWiser-group / FTrojan
Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain
☆15Updated 2 years ago
Alternatives and similar repositories for FTrojan:
Users that are interested in FTrojan are comparing it to the libraries listed below
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆24Updated 2 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆34Updated 2 years ago
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆19Updated last year
- Backdoor Cleansing with Unlabeled Data (CVPR 2023)☆13Updated last year
- ☆17Updated last year
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆17Updated 5 months ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆46Updated 9 months ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆33Updated 4 years ago
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆32Updated 3 months ago
- SEAT☆20Updated last year
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆13Updated 7 months ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆98Updated 2 years ago
- ☆53Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆53Updated 10 months ago
- ☆57Updated 2 years ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆21Updated last year
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Updated 2 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18Updated last year
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆25Updated last year
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆54Updated last year
- Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted Attacks(CVPR2023)☆17Updated last year
- ☆33Updated 6 months ago
- Github repo for One-shot Neural Backdoor Erasing via Adversarial Weight Masking (NeurIPS 2022)☆14Updated 2 years ago
- A curated list of papers for the transferability of adversarial examples☆58Updated 6 months ago
- ☆11Updated 3 years ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆17Updated last year
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆25Updated 2 months ago
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Updated 5 years ago
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆11Updated 6 months ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Updated last year