An evaluation framework for mitigating DNN backdoor attacks using data augmentations
☆11Dec 10, 2020Updated 5 years ago
Alternatives and similar repositories for DeepSweep
Users that are interested in DeepSweep are comparing it to the libraries listed below
Sorting:
- ☆23Dec 14, 2023Updated 2 years ago
- ☆11Mar 24, 2023Updated 2 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- ☆29Jun 17, 2024Updated last year
- [WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability☆18May 30, 2025Updated 9 months ago
- ☆26Jan 11, 2023Updated 3 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Apr 1, 2021Updated 4 years ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆62Nov 12, 2024Updated last year
- ☆10Jan 7, 2026Updated 2 months ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆196Sep 26, 2022Updated 3 years ago
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆36Sep 25, 2023Updated 2 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated last month
- ☆11May 25, 2025Updated 9 months ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆22Sep 6, 2021Updated 4 years ago
- ☆13Jan 30, 2019Updated 7 years ago
- ☆20Sep 20, 2025Updated 6 months ago
- The official code for ``An Engorgio Prompt Makes Large Language Model Babble on''☆22Aug 9, 2025Updated 7 months ago
- Take further steps in the arms race of adversarial examples with only preprocessing.☆37Aug 4, 2020Updated 5 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 2 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- ☆20Aug 7, 2023Updated 2 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Nov 3, 2018Updated 7 years ago
- 重写了 sylar 项目,添加了协程间的同步机制,添加了一个协程间通信的 Chan 结构。添加了一个 RPC 调用库☆14Jun 29, 2024Updated last year
- ☆11Feb 21, 2022Updated 4 years ago
- The open-sourced Python toolbox for backdoor attacks and defenses.☆649Sep 27, 2025Updated 5 months ago
- code for paper "learning to fool the speaker recognition"☆10Jun 12, 2020Updated 5 years ago
- a pytorch version of AdvGAN for cifar10 dataset☆10Dec 21, 2019Updated 6 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago
- ☆14Dec 12, 2023Updated 2 years ago
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- Datasets & Code for the WACV 2024 paper 'Robust Source-Free Domain Adaptation for Fundus Image Segmentation'☆14Jan 26, 2024Updated 2 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Distortion Agnostic watermarking based on DCT-Based Transformer☆13Dec 13, 2022Updated 3 years ago
- (Accepted by AAAI2025) official code of AIF-SFDA: Autonomous Information Filter-driven Source-Free Domain Adaptation for Medical Image Se…☆16Jan 7, 2025Updated last year
- [EMNLP 2024] The official GitHub repo for the paper "Course-Correction: Safety Alignment Using Synthetic Preferences"☆20Oct 2, 2024Updated last year
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 8 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- Denoising autoencoders for speaker identification on MCE 2018 challenge☆12Nov 8, 2018Updated 7 years ago