Zhou-Zi7 / AI-Security-Resources
This Github repository summarizes a list of research papers on AI security from the four top academic conferences.
☆105Updated last year
Alternatives and similar repositories for AI-Security-Resources:
Users that are interested in AI-Security-Resources are comparing it to the libraries listed below
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆192Updated 11 months ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆167Updated 2 years ago
- ☆213Updated 8 months ago
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆222Updated last month
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆240Updated 2 months ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆94Updated 2 years ago
- Official code for our NDSS paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarkin…☆28Updated 3 months ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆31Updated last year
- ☆454Updated 2 months ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆154Updated this week
- Composite Backdoor Attacks Against Large Language Models☆11Updated 10 months ago
- ☆47Updated last year
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆30Updated 3 years ago
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆14Updated 2 months ago
- ☆27Updated 2 months ago
- ☆24Updated last year
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆120Updated 3 months ago
- Official code for our TDSC paper "FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model"☆12Updated last month
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆123Updated last year
- This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks…☆121Updated 3 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆54Updated 3 months ago
- [ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.☆34Updated 7 months ago
- Source code and scripts for the paper "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks"☆15Updated 2 months ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆38Updated last month
- [ICLR2024] "Backdoor Federated Learning by Poisoning Backdoor-Critical Layers"☆29Updated 2 months ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆82Updated last year
- PPA attack code☆12Updated 2 years ago
- Implementation of badnets on CIFAR10 and MNIST☆9Updated 3 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆81Updated last year
- ☆10Updated 11 months ago