In the repository we provide a sample code to implement the Targeted Bit Trojan attack.
☆20Nov 7, 2020Updated 5 years ago
Alternatives and similar repositories for TBT-CVPR2020
Users that are interested in TBT-CVPR2020 are comparing it to the libraries listed below
Sorting:
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆18Jul 20, 2021Updated 4 years ago
- Pytorch implementation of Bit-Flip based adversarial weight Attack (BFA)☆33Jul 3, 2021Updated 4 years ago
- Code Repository for the Paper ---Revisiting the Assumption of Latent Separability for Backdoor Defenses (ICLR 2023)☆47Feb 28, 2023Updated 3 years ago
- ☆13Oct 21, 2021Updated 4 years ago
- LoAS: Fully Temporal-Parallel Dataflow for Dual-Sparse Spiking Neural Networks, MICRO 2024.☆17Mar 19, 2025Updated 11 months ago
- ☆20Aug 7, 2023Updated 2 years ago
- ☆19Dec 7, 2020Updated 5 years ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- ☆16Aug 21, 2020Updated 5 years ago
- ☆20May 6, 2022Updated 3 years ago
- [DATE'23] The official code for paper <CLAP: Locality Aware and Parallel Triangle Counting with Content Addressable Memory>☆23Jan 19, 2026Updated last month
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- ☆24Dec 8, 2024Updated last year
- FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption☆28Sep 2, 2025Updated 6 months ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆38Jul 22, 2024Updated last year
- ☆28Oct 14, 2021Updated 4 years ago
- ☆68Sep 29, 2020Updated 5 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- Collections of paper reviews in SEELab, related to IoT/HD/ML etc.☆32May 14, 2025Updated 9 months ago
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge☆39Sep 17, 2025Updated 5 months ago
- Official repository of SpikeZIP-TF in ICML2024☆49Dec 4, 2024Updated last year
- The SEAL-CPU backend is a Reference backend engine for HEBench which is a shared library that implements the required functions specified…☆11Mar 3, 2023Updated 3 years ago
- Python package for ML developers and researchers to change certain variables while their code is executing to make the task of training a…☆11Apr 25, 2024Updated last year
- ☆33Nov 27, 2017Updated 8 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 7 years ago
- ☆41May 26, 2024Updated last year
- ☆151Oct 9, 2024Updated last year
- ☆83Aug 3, 2021Updated 4 years ago
- ☆10Mar 8, 2025Updated last year
- Lateral Inhibition-Inspired Convolutional Neural Network for Visual Attention and Saliency Detection☆13Nov 6, 2020Updated 5 years ago
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- Arche is a Greek word with primary senses "beginning". The repository defines a framework for technology mapping of emerging technologies…☆11May 15, 2020Updated 5 years ago
- ☆10Mar 24, 2022Updated 3 years ago
- Watermarking Text Generated by Black-Box Language Models☆39Dec 9, 2023Updated 2 years ago
- PIMeval simulator and PIMbench suite☆45Nov 22, 2025Updated 3 months ago
- ConvexPolytopePosioning☆37Jan 10, 2020Updated 6 years ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆43Sep 9, 2025Updated 6 months ago
- ☆15Nov 11, 2024Updated last year
- Verilog RTL Implementation of DNN☆10Jun 26, 2018Updated 7 years ago