An evaluation framework for mitigating DNN backdoor attacks using data augmentations
☆11Dec 10, 2020Updated 5 years ago
Alternatives and similar repositories for DeepSweep
Users that are interested in DeepSweep are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Dec 14, 2023Updated 2 years ago
- ☆12Mar 24, 2023Updated 3 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆18Nov 5, 2020Updated 5 years ago
- ☆29Jun 17, 2024Updated last year
- [WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability☆18May 30, 2025Updated 11 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Apr 1, 2021Updated 5 years ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆62Nov 12, 2024Updated last year
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆197Sep 26, 2022Updated 3 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated 2 months ago
- ☆11May 25, 2025Updated 11 months ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆22Sep 6, 2021Updated 4 years ago
- ☆13Jan 30, 2019Updated 7 years ago
- The official code for ``An Engorgio Prompt Makes Large Language Model Babble on''☆22Aug 9, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Take further steps in the arms race of adversarial examples with only preprocessing.☆35Aug 4, 2020Updated 5 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 3 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- ☆21Aug 7, 2023Updated 2 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Nov 3, 2018Updated 7 years ago
- The open-sourced Python toolbox for backdoor attacks and defenses.☆661Sep 27, 2025Updated 7 months ago
- [ACL 2024] The official GitHub repo for the paper "The Earth is Flat because...: Investigating LLMs' Belief towards Misinformation via Pe…☆82Jul 19, 2024Updated last year
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 8 years ago
- ☆14Dec 12, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- Datasets & Code for the WACV 2024 paper 'Robust Source-Free Domain Adaptation for Fundus Image Segmentation'☆13Jan 26, 2024Updated 2 years ago
- (Accepted by AAAI2025) official code of AIF-SFDA: Autonomous Information Filter-driven Source-Free Domain Adaptation for Medical Image Se…☆16Jan 7, 2025Updated last year
- KDD CUP 2020 ML Track 2 "Adversarial Attacks and Defense on Academic Graph": 1st Place Solution☆19Sep 29, 2020Updated 5 years ago
- [EMNLP 2024] The official GitHub repo for the paper "Course-Correction: Safety Alignment Using Synthetic Preferences"☆20Oct 2, 2024Updated last year
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- Denoising autoencoders for speaker identification on MCE 2018 challenge☆12Nov 8, 2018Updated 7 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- ☆13Jan 25, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Confidence Regulation Neurons in Language Models (NeurIPS 2024)☆15Feb 1, 2025Updated last year
- AI voicebox on Raspberry Pi☆13Jan 27, 2026Updated 3 months ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆319Feb 28, 2020Updated 6 years ago
- A list of backdoor learning resources☆1,167Jul 31, 2024Updated last year
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆61Dec 20, 2024Updated last year
- ☆17Oct 29, 2025Updated 6 months ago
- Code for ICCV2025 paper——IDEATOR: Jailbreaking and Benchmarking Large Vision-Language Models Using Themselves☆17Jul 11, 2025Updated 10 months ago