☆224Aug 17, 2025Updated 6 months ago
Alternatives and similar repositories for AIcert
Users that are interested in AIcert are comparing it to the libraries listed below
Sorting:
- [ICLR 2025] REFINE: Inversion-Free Backdoor Defense via Model Reprogramming☆13Feb 13, 2025Updated last year
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Jun 29, 2025Updated 8 months ago
- Source code and scripts for the paper "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks"☆20Dec 10, 2024Updated last year
- KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems☆20Oct 3, 2023Updated 2 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Nov 5, 2024Updated last year
- ☆26Dec 1, 2022Updated 3 years ago
- This is the repositoary for our paper published at ICML24.☆11Jun 11, 2025Updated 8 months ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆34Aug 10, 2024Updated last year
- [ACM MM 2023] Locate and Verify: A Two-Stream Network for Improved Deepfake Detection☆66Jun 16, 2024Updated last year
- [Remote Sensing 2022] PGNet: Positioning Guidance Network for Semantic Segmentation of Very-High-Resolution Remote Sensing Images☆13Dec 9, 2022Updated 3 years ago
- A reading list for large models safety, security, and privacy (including Awesome LLM Security, Safety, etc.).☆1,870Feb 23, 2026Updated last week
- [ICML 2023] "Robust Weight Signatures: Gaining Robustness as Easy as Patching Weights?" by Ruisi Cai, Zhenyu Zhang, Zhangyang Wang☆16May 4, 2023Updated 2 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 4 years ago
- [IEEE TBD 2023] IEMask R-CNN: Information-enhanced Mask R-CNN☆16Mar 14, 2023Updated 2 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆17Sep 21, 2025Updated 5 months ago
- ☆40Nov 4, 2024Updated last year
- ☆20Oct 28, 2025Updated 4 months ago
- ☆27Nov 9, 2022Updated 3 years ago
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- The open-sourced Python toolbox for backdoor attacks and defenses.☆644Sep 27, 2025Updated 5 months ago
- ☆17Oct 31, 2023Updated 2 years ago
- ☆17Feb 25, 2024Updated 2 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆140Sep 11, 2025Updated 5 months ago
- [TDSC 2024] Official code for our paper "FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model"☆22May 14, 2025Updated 9 months ago
- ☆17Dec 5, 2025Updated 3 months ago
- official repository for the NeurIPS 2022 paper "Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Att…☆20Oct 28, 2022Updated 3 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- ☆22Apr 23, 2024Updated last year
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆63Dec 20, 2024Updated last year
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆28Mar 24, 2025Updated 11 months ago
- [ACM MM 2023 ]DFIL Codes☆25Jan 2, 2024Updated 2 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- Official Implementation for "Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approxim…☆12Aug 14, 2024Updated last year
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Code for the paper: Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions☆11Mar 13, 2024Updated last year
- [CVPR 2025] Harnessing Frequency Spectrum Insights for Image Copyright Protection Against Diffusion Models☆12Sep 16, 2025Updated 5 months ago
- ☆14Feb 26, 2025Updated last year
- A curated list of papers for the transferability of adversarial examples☆76Jul 8, 2024Updated last year