This Github repository summarizes a list of research papers on AI security from the four top academic conferences.
☆182May 21, 2025Updated 10 months ago
Alternatives and similar repositories for Awesome-AI-Security-BIG4
Users that are interested in Awesome-AI-Security-BIG4 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆25May 25, 2023Updated 2 years ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆343Nov 11, 2025Updated 5 months ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- Source code for paper "Targeted Adversarial Attack for Deep Cross-modal Hashing Retrieval".☆19May 4, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- Code for our NeurIPS 2023 paper Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly☆14Jan 22, 2024Updated 2 years ago
- 华中科技大学-网络空间安全学院-网络攻防实践(三)-2022春☆47Jan 5, 2023Updated 3 years ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆25Apr 2, 2024Updated 2 years ago
- ☆23Dec 14, 2023Updated 2 years ago
- The open-sourced Python toolbox for backdoor attacks and defenses.☆657Sep 27, 2025Updated 6 months ago
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆19Jul 20, 2021Updated 4 years ago
- ☆18Jul 18, 2024Updated last year
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)☆18Mar 31, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆10Mar 20, 2023Updated 3 years ago
- A curated list of academic events on AI Security & Privacy☆167Aug 22, 2024Updated last year
- A reading list for large models safety, security, and privacy (including Awesome LLM Security, Safety, etc.).☆1,937Apr 2, 2026Updated 2 weeks ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- ☆11Dec 23, 2024Updated last year
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- Implement of Implicit Knowledge Extraction Attack.☆22Updated this week
- Region-Based Optimization in Continual Learning for Audio Deepfake Detection☆12Dec 17, 2024Updated last year
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for paper "Membership Inference Attacks Against Vision-Language Models"☆28Jan 25, 2025Updated last year
- [NeurIPS 2024] "Membership Inference on Text-to-image Diffusion Models via Conditional Likelihood Discrepancy"☆12Sep 15, 2025Updated 7 months ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- Code for the CVPR '23 paper, "Defending Against Patch-based Backdoor Attacks on Self-Supervised Learning"☆10Jun 9, 2023Updated 2 years ago
- 武汉大学国家网络安全学院2021级操作系统期末大实验☆12Jan 2, 2024Updated 2 years ago
- ☆34May 2, 2021Updated 4 years ago
- A list of backdoor learning resources☆1,163Jul 31, 2024Updated last year
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆32Oct 15, 2024Updated last year
- ☆27Aug 7, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- [CCS 2024] "BadMerging: Backdoor Attacks Against Model Merging": official code implementation.☆36Aug 22, 2024Updated last year
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆63Apr 7, 2024Updated 2 years ago
- ☆22Oct 5, 2023Updated 2 years ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆193Sep 23, 2025Updated 6 months ago
- A curated list of safety-related papers, articles, and resources focused on Large Language Models (LLMs). This repository aims to provide…☆1,827Apr 3, 2026Updated 2 weeks ago
- [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆220Apr 3, 2026Updated 2 weeks ago