TooTouch / SIDLinks
pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain
☆11Updated 3 years ago
Alternatives and similar repositories for SID
Users that are interested in SID are comparing it to the libraries listed below
Sorting:
- Towards Machine Unlearning Benchmarks: Forgetting the Personal Identities in Facial Recognition Systems☆64Updated 6 months ago
- [NeurIPS 2021] Official PyTorch Implementation for "Distilling Robust and Non-Robust Features in Adversarial Examples by Information Bott…☆49Updated 2 years ago
- Code for Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks (NeurIPS 2022)☆10Updated 2 years ago
- ☆15Updated 2 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆37Updated 7 months ago
- ☆24Updated 8 months ago
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Updated last year
- ☆20Updated last month
- ☆53Updated 2 years ago
- Robust natural language watermarking using invariant features☆28Updated 2 years ago
- ☆13Updated 4 years ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆19Updated last year
- Code for identifying natural backdoors in existing image datasets.☆15Updated 3 years ago
- ☆53Updated last year
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Updated last year
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Updated last year
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆42Updated last year
- Github repo for One-shot Neural Backdoor Erasing via Adversarial Weight Masking (NeurIPS 2022)☆15Updated 2 years ago
- A toolbox for backdoor attacks.☆22Updated 2 years ago
- ☆12Updated 3 years ago
- ☆10Updated 11 months ago
- Backdoor Cleansing with Unlabeled Data (CVPR 2023)☆13Updated 2 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆18Updated 9 months ago
- ☆14Updated 2 years ago
- ☆10Updated 3 years ago
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆26Updated 2 years ago
- ☆10Updated 3 years ago
- ☆12Updated 10 months ago
- ☆31Updated 3 years ago
- ☆84Updated 4 years ago