TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classification in deep leanring.
☆21Jan 7, 2021Updated 5 years ago
Alternatives and similar repositories for Trojan-Zoo
Users that are interested in Trojan-Zoo are comparing it to the libraries listed below
Sorting:
- ☆12Jan 28, 2023Updated 3 years ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆28Sep 19, 2023Updated 2 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆303Aug 25, 2025Updated 6 months ago
- ☆10Sep 23, 2020Updated 5 years ago
- using yolov5 to detect whether people fall down or not☆11May 9, 2023Updated 2 years ago
- CartoonX is a saliency map method for image classifiers operating in the wavelet/shearlet domain.☆10Feb 23, 2026Updated 2 weeks ago
- A framework for steering MoE models by detecting and controlling behavior-linked experts.☆30Sep 12, 2025Updated 5 months ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Nov 4, 2020Updated 5 years ago
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆378Feb 5, 2023Updated 3 years ago
- 工业级中文语音识别系统电子书☆13Oct 30, 2020Updated 5 years ago
- Minimum viable code for the Decodable Information Bottleneck paper. Pytorch Implementation.☆11Oct 20, 2020Updated 5 years ago
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆12May 6, 2023Updated 2 years ago
- LIMA: Language for Integrated Modeling and Analysis☆12Sep 8, 2018Updated 7 years ago
- Official Repository for Can Language Models be Instructed to Protect Personal Information?☆13Oct 8, 2023Updated 2 years ago
- Data Science Challenge☆11May 14, 2021Updated 4 years ago
- Utility functions for weights and biases (wandb).☆11Sep 17, 2024Updated last year
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- This repository contains the artifacts accompanied by the paper "Fair Preprocessing"☆13Jul 20, 2021Updated 4 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Official implementation of Resisting Backdoor Attacks in Federated Learning via Bidirectional Elections and Individual Perspective☆13Sep 4, 2024Updated last year
- [ICLR'24 Spotlight] DP-OPT: Make Large Language Model Your Privacy-Preserving Prompt Engineer☆46May 30, 2024Updated last year
- Regression analysis using python and scikit learn - Communities and Crime Data Set (UCI).☆10Jul 14, 2018Updated 7 years ago
- One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks (ICLR 2023 Spotlight)☆14Sep 28, 2025Updated 5 months ago
- CVPR 2021 | Code to reproduce the results of the paper: A Khakzar, S Baselizadeh, S Khanduja, C Rupprecht, ST Kim, N Navab, Neural Respon…☆12Jun 23, 2021Updated 4 years ago
- 我的dotfiles,使用stow管理☆22Feb 20, 2026Updated 2 weeks ago
- Mutation-based Fault Localization of Deep Neural Networks☆10Jan 25, 2024Updated 2 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- A list of compatible datasets, noting other major repositories containing popular real-world datasets, along with sample code for a range…☆12Mar 18, 2020Updated 5 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- Official code for FAccT'21 paper "Fairness Through Robustness: Investigating Robustness Disparity in Deep Learning" https://arxiv.org/abs…☆13Mar 9, 2021Updated 5 years ago
- 🤫 Code and benchmark for our ICLR 2024 spotlight paper: "Can LLMs Keep a Secret? Testing Privacy Implications of Language Models via Con…☆50Dec 20, 2023Updated 2 years ago
- 使用yolox训练自己的数据集☆13May 9, 2023Updated 2 years ago
- ☆11May 9, 2023Updated 2 years ago
- [CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"☆14Oct 29, 2025Updated 4 months ago
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Jul 16, 2021Updated 4 years ago
- Objective-C client for the Zotero API.☆20May 19, 2016Updated 9 years ago
- Generate custom text files for dataloader within UDA methods☆14May 24, 2023Updated 2 years ago