YiZeng623 / frequency-backdoorLinks
ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Repo. explores how we can use these artifacts to develop stronger backdoor defenses and attacks.
☆44Updated 3 years ago
Alternatives and similar repositories for frequency-backdoor
Users that are interested in frequency-backdoor are comparing it to the libraries listed below
Sorting:
- ☆19Updated 2 years ago
- Code Repository for the Paper ---Revisiting the Assumption of Latent Separability for Backdoor Defenses (ICLR 2023)☆42Updated 2 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 2 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Updated 2 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 2 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆26Updated 7 months ago
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆36Updated 8 months ago
- ☆27Updated 2 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆58Updated 2 years ago
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Updated 9 months ago
- Github repo for One-shot Neural Backdoor Erasing via Adversarial Weight Masking (NeurIPS 2022)☆15Updated 2 years ago
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆33Updated 2 years ago
- ☆24Updated 2 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆30Updated 2 months ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆19Updated 2 years ago
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆30Updated 4 years ago
- ☆23Updated 2 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 3 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆81Updated last year
- Code for "Label-Consistent Backdoor Attacks"☆57Updated 4 years ago
- A toolbox for backdoor attacks.☆22Updated 2 years ago
- ☆19Updated 3 years ago
- ☆11Updated 2 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆34Updated 2 years ago
- ☆18Updated 2 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Updated 4 years ago
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆34Updated last year
- ☆21Updated 4 years ago
- Code for Transferable Unlearnable Examples☆20Updated 2 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Updated 2 years ago