TooTouch / SIDLinks
pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain
☆10Updated 2 years ago
Alternatives and similar repositories for SID
Users that are interested in SID are comparing it to the libraries listed below
Sorting:
- Towards Machine Unlearning Benchmarks: Forgetting the Personal Identities in Facial Recognition Systems☆61Updated last month
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆30Updated 3 months ago
- Code for Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks (NeurIPS 2022)☆9Updated 2 years ago
- [NeurIPS 2021] Official PyTorch Implementation for "Distilling Robust and Non-Robust Features in Adversarial Examples by Information Bott…☆47Updated 2 years ago
- Robust natural language watermarking using invariant features☆26Updated last year
- This is a PyTorch implementation of the paper "Reinforcement Learning-Based Black-Box Model Inversion Attacks" accepted by CVPR 2023.☆38Updated 2 years ago
- ☆16Updated 4 months ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆41Updated 3 weeks ago
- [CVPR 2022] Official PyTorch Implementation for "Masking Adversarial Damage: Finding Adversarial Saliency for Robust and Sparse Network"☆32Updated 2 years ago
- ☆13Updated 3 years ago
- ☆47Updated last year
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆44Updated 3 years ago
- ☆53Updated 2 years ago
- ☆20Updated last year
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Updated 10 months ago
- A toolbox for backdoor attacks.☆22Updated 2 years ago
- ☆18Updated 2 years ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆16Updated last year
- ☆10Updated 7 months ago
- ☆10Updated 2 years ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated 2 years ago
- Backdoor Cleansing with Unlabeled Data (CVPR 2023)☆13Updated 2 years ago
- ☆82Updated 3 years ago
- ☆21Updated 2 years ago
- ☆11Updated 6 months ago
- This is the code of ICLR 2022 Oral paper 'Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Au…☆30Updated last year
- A curated list of papers for the transferability of adversarial examples☆72Updated last year
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆38Updated last year
- Consistency Regularization for Adversarial Robustness (AAAI 2022)☆53Updated 3 years ago
- A pytorch implementation of WRN for CIFAR10