In the repository we provide a sample code to implement the Targeted Bit Trojan attack.
☆20Nov 7, 2020Updated 5 years ago
Alternatives and similar repositories for TBT-CVPR2020
Users that are interested in TBT-CVPR2020 are comparing it to the libraries listed below
Sorting:
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆18Jul 20, 2021Updated 4 years ago
- Pytorch implementation of Bit-Flip based adversarial weight Attack (BFA)☆33Jul 3, 2021Updated 4 years ago
- [CVPR 2023] "TrojViT: Trojan Insertion in Vision Transformers" by Mengxin Zheng, Qian Lou, Lei Jiang☆14Jan 5, 2024Updated 2 years ago
- Code Repository for the Paper ---Revisiting the Assumption of Latent Separability for Backdoor Defenses (ICLR 2023)☆47Feb 28, 2023Updated 3 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆15Feb 16, 2022Updated 4 years ago
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- ☆13Oct 21, 2021Updated 4 years ago
- LoAS: Fully Temporal-Parallel Dataflow for Dual-Sparse Spiking Neural Networks, MICRO 2024.☆17Mar 19, 2025Updated 11 months ago
- ☆20Aug 7, 2023Updated 2 years ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- ☆19Dec 7, 2020Updated 5 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- ☆20May 6, 2022Updated 3 years ago
- [DATE'23] The official code for paper <CLAP: Locality Aware and Parallel Triangle Counting with Content Addressable Memory>☆23Jan 19, 2026Updated last month
- ☆24Dec 8, 2024Updated last year
- FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption☆28Sep 2, 2025Updated 6 months ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆38Jul 22, 2024Updated last year
- ☆68Sep 29, 2020Updated 5 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- Official repository of SpikeZIP-TF in ICML2024☆49Dec 4, 2024Updated last year
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge☆39Sep 17, 2025Updated 5 months ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆133Oct 24, 2023Updated 2 years ago
- The SEAL-CPU backend is a Reference backend engine for HEBench which is a shared library that implements the required functions specified…☆11Mar 3, 2023Updated 3 years ago
- Python package for ML developers and researchers to change certain variables while their code is executing to make the task of training a…☆11Apr 25, 2024Updated last year
- ☆33Nov 27, 2017Updated 8 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 7 years ago
- ☆41May 26, 2024Updated last year
- ☆151Oct 9, 2024Updated last year
- ☆83Aug 3, 2021Updated 4 years ago
- Arche is a Greek word with primary senses "beginning". The repository defines a framework for technology mapping of emerging technologies…☆11May 15, 2020Updated 5 years ago
- ☆10Mar 8, 2025Updated last year
- PIMeval simulator and PIMbench suite☆45Nov 22, 2025Updated 3 months ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 4 years ago
- Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.☆11Jan 19, 2018Updated 8 years ago
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- ☆10Mar 24, 2022Updated 3 years ago
- Watermarking Text Generated by Black-Box Language Models☆39Dec 9, 2023Updated 2 years ago
- ConvexPolytopePosioning☆37Jan 10, 2020Updated 6 years ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆43Sep 9, 2025Updated 6 months ago