TzviLederer / silent-killer
Implementation of the paper Silent Killer
☆25Updated last year
Alternatives and similar repositories for silent-killer:
Users that are interested in silent-killer are comparing it to the libraries listed below
- unformal implementation of advdiffuser☆14Updated last year
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆30Updated 2 months ago
- Code for "Label-Consistent Backdoor Attacks"☆55Updated 4 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆25Updated last year
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆30Updated 4 years ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆17Updated last year
- ☆26Updated 2 years ago
- ☆11Updated 2 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆29Updated last year
- ☆18Updated last year
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆50Updated 2 years ago
- ☆13Updated 10 months ago
- ☆24Updated last year
- ☆23Updated 3 years ago
- ☆17Updated 3 years ago
- ☆17Updated 3 years ago
- ☆14Updated 9 months ago
- ☆65Updated last year
- ☆42Updated last year
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆28Updated 5 months ago
- ☆34Updated last year
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆27Updated 3 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 3 years ago
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆28Updated 3 weeks ago
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆34Updated 6 months ago
- ☆48Updated 5 months ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆84Updated 2 years ago
- ☆19Updated 2 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆101Updated 2 years ago
- ☆49Updated 3 years ago