alps-lab / Trojan-ZooView external linksLinks
TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classification in deep leanring.
☆21Jan 7, 2021Updated 5 years ago
Alternatives and similar repositories for Trojan-Zoo
Users that are interested in Trojan-Zoo are comparing it to the libraries listed below
Sorting:
- ☆12Jan 28, 2023Updated 3 years ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Jun 17, 2021Updated 4 years ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆28Sep 19, 2023Updated 2 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆302Aug 25, 2025Updated 5 months ago
- Differentially private release of semantic rich data☆35Jun 17, 2021Updated 4 years ago
- ☆10Sep 23, 2020Updated 5 years ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Nov 4, 2020Updated 5 years ago
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆378Feb 5, 2023Updated 3 years ago
- Data Science Challenge☆11May 14, 2021Updated 4 years ago
- Official implementation of Resisting Backdoor Attacks in Federated Learning via Bidirectional Elections and Individual Perspective☆13Sep 4, 2024Updated last year
- Generate images of Chinese license plates☆11Feb 8, 2021Updated 5 years ago
- ☆10Apr 21, 2022Updated 3 years ago
- Official Repo of Your Agent May Misevolve: Emergent Risks in Self-evolving LLM Agents☆58Oct 28, 2025Updated 3 months ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- 工业级中文语音识别系统电子书☆13Oct 30, 2020Updated 5 years ago
- Image recommendation service with image on the input that outputs most similar images from database.☆13Sep 19, 2020Updated 5 years ago
- This repository contains the artifacts accompanied by the paper "Fair Preprocessing"☆13Jul 20, 2021Updated 4 years ago
- Companion repository to "Prompt Compression and Contrastive Conditioning for Controllability and Toxicity Reduction in Language Models"☆14May 31, 2023Updated 2 years ago
- Minimum viable code for the Decodable Information Bottleneck paper. Pytorch Implementation.☆11Oct 20, 2020Updated 5 years ago
- A large-scale dataset composed of high-quality synthetic images aimed at evaluating social biases in LVLMs☆13Oct 6, 2025Updated 4 months ago
- Record my learning progress.☆10Mar 1, 2022Updated 3 years ago
- Official Repository for Can Language Models be Instructed to Protect Personal Information?☆13Oct 8, 2023Updated 2 years ago
- [ICLR'24 Spotlight] DP-OPT: Make Large Language Model Your Privacy-Preserving Prompt Engineer☆46May 30, 2024Updated last year
- End-to-end codebase for finetuning LLMs (LLaMA 2, 3, etc.) with or without DP☆16Sep 23, 2024Updated last year
- Regression analysis using python and scikit learn - Communities and Crime Data Set (UCI).☆10Jul 14, 2018Updated 7 years ago
- [CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"☆14Oct 29, 2025Updated 3 months ago
- One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks (ICLR 2023 Spotlight)☆14Sep 28, 2025Updated 4 months ago
- 我的dotfiles,使用stow管理☆22Updated this week
- A list of compatible datasets, noting other major repositories containing popular real-world datasets, along with sample code for a range…☆12Mar 18, 2020Updated 5 years ago
- 使用yolox训练自己的数据集☆13May 9, 2023Updated 2 years ago
- ☆11May 9, 2023Updated 2 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 4 years ago
- Official implementation for paper "FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning" (NeurIPS 2023).☆13Oct 25, 2024Updated last year
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- CVPR 2021 | Code to reproduce the results of the paper: A Khakzar, S Baselizadeh, S Khanduja, C Rupprecht, ST Kim, N Navab, Neural Respon…☆12Jun 23, 2021Updated 4 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 3 years ago
- ☆10Jan 31, 2022Updated 4 years ago