Trustworthy-and-Responsible-AI-Lab / Qu-ANTI-zationView external linksLinks
[NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"
☆18Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for Qu-ANTI-zation
Users that are interested in Qu-ANTI-zation are comparing it to the libraries listed below
Sorting:
- competition☆17Aug 1, 2020Updated 5 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- Official Implementation for "Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approxim…☆12Aug 14, 2024Updated last year
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- ☆16Dec 3, 2021Updated 4 years ago
- ☆20Aug 7, 2023Updated 2 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- ☆19Mar 26, 2022Updated 3 years ago
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Jun 19, 2020Updated 5 years ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆20Mar 9, 2025Updated 11 months ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆19Jul 27, 2023Updated 2 years ago
- ☆22Sep 17, 2024Updated last year
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- Simple classifier to classify SVHN images, based on Keras with the Tensorflow backend.☆17Feb 26, 2018Updated 7 years ago
- ☆20May 6, 2022Updated 3 years ago
- ☆27Oct 17, 2022Updated 3 years ago
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆27Oct 5, 2022Updated 3 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆20Nov 7, 2020Updated 5 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆38Jul 22, 2024Updated last year
- This repository collects the latest research progress of Privacy-Preserving Recommender Systems after 2018.☆30Nov 4, 2021Updated 4 years ago
- A robotframework library that repairs failing Robot Framework tests automatically via AI☆21Feb 5, 2026Updated last week
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆378Feb 5, 2023Updated 3 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆135Nov 11, 2024Updated last year
- This is the code of ICLR 2022 Oral paper 'Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Au…☆30Oct 22, 2023Updated 2 years ago
- Real-Time Network Intrusion Detection Framework☆13Mar 21, 2025Updated 10 months ago
- ☆36Apr 7, 2022Updated 3 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆83Jul 20, 2023Updated 2 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 7 years ago
- ☆83Aug 3, 2021Updated 4 years ago
- ☆11Mar 31, 2022Updated 3 years ago
- Veri yapıları dersi 2022☆10Jan 7, 2023Updated 3 years ago
- Learn OpenCV : C++ and Python Examples☆10Mar 14, 2019Updated 6 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 3 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- ☆10Dec 8, 2018Updated 7 years ago
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆48Apr 27, 2022Updated 3 years ago
- Hiding Images in Plain Sight: Deep Steganography☆39Jun 18, 2018Updated 7 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆38Jun 14, 2023Updated 2 years ago