TzviLederer / silent-killer
Implementation of the paper Silent Killer
☆25Updated last year
Alternatives and similar repositories for silent-killer:
Users that are interested in silent-killer are comparing it to the libraries listed below
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆89Updated 7 months ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆16Updated last year
- ☆18Updated last year
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Updated 4 years ago
- ☆65Updated last year
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆22Updated last year
- Pytorch implementation of Backdoor Attack against Speaker Verification☆25Updated last year
- Code for "Label-Consistent Backdoor Attacks"☆55Updated 4 years ago
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆30Updated 4 years ago
- ☆19Updated 2 years ago
- ☆14Updated 10 months ago
- ☆42Updated last year
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆34Updated 7 months ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆36Updated 9 months ago
- [MM '24] EvilEdit: Backdooring Text-to-Image Diffusion Models in One Second☆18Updated 5 months ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆30Updated last year
- ☆25Updated last year
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆23Updated last year
- ☆25Updated 2 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆65Updated 3 years ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆28Updated 6 months ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated last year
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆18Updated 4 months ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆37Updated last year
- ☆17Updated 3 years ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆55Updated last year
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆16Updated last year
- KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems☆17Updated last year
- ☆12Updated 9 months ago
- ☆23Updated 10 months ago