TzviLederer / silent-killerView external linksLinks
Implementation of the paper Silent Killer
☆25Mar 18, 2024Updated last year
Alternatives and similar repositories for silent-killer
Users that are interested in silent-killer are comparing it to the libraries listed below
Sorting:
- TEAL: New Selection Strategy for Small Buffers in Experience Replay Class Incremental Learning☆17Jan 21, 2025Updated last year
- An official implementation of ProbeGen☆13Oct 20, 2024Updated last year
- ☆69Feb 17, 2024Updated last year
- The official code for the SALMon🍣 benchmark (ICASSP 2025 - Oral)☆48Aug 15, 2025Updated 5 months ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- The official repo of the paper "StressTest: Can YOUR Speech LM Handle the Stress?"☆20Jul 9, 2025Updated 7 months ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆133Oct 24, 2023Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆33Sep 23, 2023Updated 2 years ago
- ☆11Jun 18, 2023Updated 2 years ago
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆12Jul 17, 2024Updated last year
- Official implementation of "Describing Sets of Images with Textual-PCA".☆16Feb 13, 2023Updated 3 years ago
- Distributed YOLOv8m face detection using FedAvg and FedGH (our method). This repository is based on PACSSK-401001 group project outcoming…☆19Aug 13, 2023Updated 2 years ago
- ☆10Apr 6, 2024Updated last year
- Official PyTorch Implementation for the "Unsupervised Model Tree Heritage Recovery" paper (ICLR 2025).☆63Jul 1, 2025Updated 7 months ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- Implementation of Federated Learning algorithms such as FedAvg, FedAvgM, SCAFFOLD, FedOpt, Mime using PyTorch.☆12Jan 2, 2023Updated 3 years ago
- Official code for "TWINS: A Fine-Tuning Framework for Improved Transferability of Adversarial Robustness and Generalization", CVPR 2023☆13Apr 26, 2023Updated 2 years ago
- Code for Visual Information Hiding Based on Obfuscating Adversarial Perturbations☆13Jan 9, 2024Updated 2 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Aug 17, 2023Updated 2 years ago
- Towards Deep Learning Models Resistant to Adversarial Attacks论文复现☆15Aug 18, 2021Updated 4 years ago
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Apr 19, 2024Updated last year
- Official implementation of paper 'Fair Feature Distillation for Visual Recognition'☆17Jun 23, 2021Updated 4 years ago
- ☆16Dec 18, 2023Updated 2 years ago
- 从零构建 AI Agent:LLM 大模型应用开发实战 (AI 天才研究院 )☆15Apr 10, 2025Updated 10 months ago
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆21Dec 6, 2023Updated 2 years ago
- GCNs Analysis: Visualization, Error Cases etc.☆14Feb 15, 2023Updated 2 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆16Jun 3, 2024Updated last year
- CVPR 2023 generalist☆16Oct 25, 2023Updated 2 years ago
- ☆16Jul 17, 2022Updated 3 years ago
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆16Oct 24, 2024Updated last year
- ☆17Dec 5, 2025Updated 2 months ago
- The core code for our paper "Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning".☆21Dec 25, 2023Updated 2 years ago
- ☆18Nov 13, 2021Updated 4 years ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆20Sep 29, 2022Updated 3 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆19Jul 27, 2023Updated 2 years ago
- ☆24Feb 19, 2025Updated 11 months ago