WangLab2021 / AI-SecurityLinks
☆12Updated 2 weeks ago
Alternatives and similar repositories for AI-Security
Users that are interested in AI-Security are comparing it to the libraries listed below
Sorting:
- ☆560Updated 5 months ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆129Updated last year
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆228Updated last year
- Invisible Backdoor Attack with Sample-Specific Triggers☆103Updated 3 years ago
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆22Updated 11 months ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆132Updated 2 years ago
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆280Updated 10 months ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆412Updated 2 months ago
- ☆120Updated 2 months ago
- ☆32Updated 4 years ago
- [ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.☆50Updated last year
- IBA: Towards Irreversible Backdoor Attacks in Federated Learning (Poster at NeurIPS 2023)☆38Updated 2 months ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆138Updated 2 months ago
- A paper list for localized adversarial patch research☆159Updated 4 months ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆113Updated 3 years ago
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆17Updated last year
- A curated list of papers for the transferability of adversarial examples☆75Updated last year
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Updated last year
- ☆45Updated 2 years ago
- ☆16Updated last year
- ☆20Updated 3 years ago
- ☆31Updated last year
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Updated last year
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆43Updated 2 months ago
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆26Updated 2 years ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆100Updated 4 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆92Updated 3 years ago
- This repository contains Python code for the paper "Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearni…☆20Updated last year
- ☆29Updated 2 years ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆40Updated 2 years ago