TooTouch / SIDLinks
pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain
☆11Updated 2 years ago
Alternatives and similar repositories for SID
Users that are interested in SID are comparing it to the libraries listed below
Sorting:
- Towards Machine Unlearning Benchmarks: Forgetting the Personal Identities in Facial Recognition Systems☆62Updated 4 months ago
- [NeurIPS 2021] Official PyTorch Implementation for "Distilling Robust and Non-Robust Features in Adversarial Examples by Information Bott…☆48Updated 2 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆35Updated 5 months ago
- Code for Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks (NeurIPS 2022)☆10Updated 2 years ago
- ☆15Updated 2 years ago
- ☆20Updated 6 months ago
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Updated last year
- ☆13Updated 3 years ago
- Robust natural language watermarking using invariant features☆26Updated last year
- ☆20Updated last year
- ☆53Updated 2 years ago
- ☆50Updated last year
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆19Updated 2 years ago
- ☆20Updated last year
- ☆84Updated 4 years ago
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆45Updated 3 years ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆48Updated last month
- ☆14Updated last year
- [CVPR 2022] Official PyTorch Implementation for "Masking Adversarial Damage: Finding Adversarial Saliency for Robust and Sparse Network"☆32Updated 2 years ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆17Updated last year
- Code for identifying natural backdoors in existing image datasets.☆15Updated 3 years ago
- ☆40Updated last year
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆98Updated 4 years ago
- ☆18Updated 2 years ago
- Consistency Regularization for Adversarial Robustness (AAAI 2022)☆53Updated 3 years ago
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆36Updated 2 weeks ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Updated last year
- ☆11Updated 2 years ago
- ☆59Updated 2 years ago
- Robustify Black-Box Models (ICLR'22 - Spotlight)☆24Updated 2 years ago