ashafahi / inceptionv3-transferLearn-poisonView external linksLinks
Attacking a dog vs fish classification that uses transfer learning inceptionV3
☆74Apr 12, 2018Updated 7 years ago
Alternatives and similar repositories for inceptionv3-transferLearn-poison
Users that are interested in inceptionv3-transferLearn-poison are comparing it to the libraries listed below
Sorting:
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆18May 13, 2019Updated 6 years ago
- ConvexPolytopePosioning☆37Jan 10, 2020Updated 6 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- [PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Feb 27, 2021Updated 4 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆111Aug 19, 2024Updated last year
- competition☆17Aug 1, 2020Updated 5 years ago
- A unified benchmark problem for data poisoning attacks☆161Oct 4, 2023Updated 2 years ago
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 5 years ago
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆55Mar 24, 2021Updated 4 years ago
- ☆13Oct 21, 2021Updated 4 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆37Jul 22, 2024Updated last year
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- ☆19Mar 26, 2022Updated 3 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆34Jul 15, 2021Updated 4 years ago
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆29Feb 8, 2021Updated 5 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆314Feb 28, 2020Updated 5 years ago
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Sep 9, 2024Updated last year
- ☆19Jun 21, 2021Updated 4 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- ☆19Mar 6, 2023Updated 2 years ago
- ☆21Oct 25, 2023Updated 2 years ago
- ☆27Oct 17, 2022Updated 3 years ago
- ☆83Aug 3, 2021Updated 4 years ago
- Code for "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples" (NDSS 2020)☆22Nov 14, 2020Updated 5 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 3 years ago
- ☆68Sep 29, 2020Updated 5 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆302Aug 25, 2025Updated 5 months ago
- Source code for paper "How to Backdoor Federated Learning" (https://arxiv.org/abs/1807.00459)☆313Jul 25, 2024Updated last year
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- ☆10Dec 18, 2024Updated last year
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 4 years ago