Implementation of the paper Silent Killer
☆25Mar 18, 2024Updated 2 years ago
Alternatives and similar repositories for silent-killer
Users that are interested in silent-killer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official repository for "Speaking Style Conversion With Discrete Self-Supervised Units" (EMNLP 2023). https://arxiv.org/abs/2212.09730☆131Dec 8, 2023Updated 2 years ago
- An official PyTorch implementation for CLIPPR☆30Jul 22, 2023Updated 2 years ago
- An official implementation of ProbeGen☆13Oct 20, 2024Updated last year
- Official implementation of "Dataset Size Recovery from LoRA Weights" paper.☆34Jun 30, 2024Updated last year
- ☆21Aug 7, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆132Oct 24, 2023Updated 2 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- This repo contains the official PyTorch implementation of "Analyzing Discrete Self Supervised Speech Representation For Spoken Language M…☆20Jan 3, 2023Updated 3 years ago
- This repo contains the official PyTorch implementation of vLMIG: Improving Visual Commonsense in Language Models via Multiple Image Gener…☆17Jul 1, 2024Updated last year
- Official implementation of paper 'Fair Feature Distillation for Visual Recognition'☆17Jun 23, 2021Updated 4 years ago
- Official code for "TWINS: A Fine-Tuning Framework for Improved Transferability of Adversarial Robustness and Generalization", CVPR 2023☆13Apr 26, 2023Updated 2 years ago
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆33Sep 23, 2023Updated 2 years ago
- Official pytorch re-implementation of "Demystifying Inter-Class Disentanglement", ICLR 2020.☆13Dec 2, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- Distributed YOLOv8m face detection using FedAvg and FedGH (our method). This repository is based on PACSSK-401001 group project outcoming…☆19Aug 13, 2023Updated 2 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- Official PyTorch Implementation for the "Recovering the Pre-Fine-Tuning Weights of Generative Models" paper (ICML 2024).☆85Apr 15, 2025Updated 11 months ago
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆18May 13, 2019Updated 6 years ago
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- ☆16Dec 18, 2023Updated 2 years ago
- GCNs Analysis: Visualization, Error Cases etc.☆14Feb 15, 2023Updated 3 years ago
- ☆11Apr 6, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆16Oct 24, 2024Updated last year
- CVPR 2023 generalist☆16Oct 25, 2023Updated 2 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- Towards Deep Learning Models Resistant to Adversarial Attacks论文复现☆15Aug 18, 2021Updated 4 years ago
- Official pytorch implementation of "An Image is Worth More Than a Thousand Words: Towards Disentanglement in the Wild", NeurIPS 2021.☆28Nov 19, 2022Updated 3 years ago
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆27Jul 3, 2025Updated 8 months ago
- Code for Visual Information Hiding Based on Obfuscating Adversarial Perturbations☆13Jan 9, 2024Updated 2 years ago
- This repo contains the official PyTorch implementation of "A Systematic Comparison of Phonetic Aware Techniques for Speech Enhancement" (…☆28Aug 8, 2022Updated 3 years ago
- Implementation of Federated Learning algorithms such as FedAvg, FedAvgM, SCAFFOLD, FedOpt, Mime using PyTorch.☆12Jan 2, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code for the ICLR 2019 paper "Invariant and Equiovariant Graph Networks"☆25May 20, 2020Updated 5 years ago
- ☆18Dec 5, 2025Updated 3 months ago
- ☆16Dec 3, 2021Updated 4 years ago
- ☆16Jul 17, 2022Updated 3 years ago
- This smart assistant uses advanced Multi-Agent AI systems, leveraging over 10+ agents working asynchronously to perform 20+ tasks. From d…☆25Jan 11, 2025Updated last year
- Official implementation of the CVPR 2022 paper "Backdoor Attacks on Self-Supervised Learning".☆75Oct 24, 2023Updated 2 years ago
- A simple test for GAN☆10Mar 25, 2024Updated 2 years ago