cristinalan / FlowMurLinks
Source code of paper "FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge"
☆16Updated last year
Alternatives and similar repositories for FlowMur
Users that are interested in FlowMur are comparing it to the libraries listed below
Sorting:
- KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems☆17Updated last year
- Code of paper "AdvReverb: AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception"☆17Updated last year
- 使用pytorch实现FGSM☆31Updated 4 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆41Updated 8 months ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆39Updated 9 months ago
- ☆18Updated last year
- Pytorch implementation of Backdoor Attack against Speaker Verification☆26Updated last year
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆13Updated 4 years ago
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆142Updated 2 months ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 3 years ago
- 基于LSB隐写术将文本隐藏于320x240的灰度图像☆20Updated 5 years ago
- Source code and scripts for the paper "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks"☆18Updated 8 months ago
- ☆223Updated last year
- Robust Audio Adversarial Example for a Physical Attack☆63Updated 5 years ago
- Devil-Whisper-Attack☆36Updated 4 months ago
- ☆13Updated last year
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆27Updated 2 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆116Updated 2 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated last year
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆40Updated 4 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆18Updated 2 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆179Updated 2 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆103Updated 2 years ago
- ☆12Updated last year
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆57Updated 9 months ago
- ☆60Updated 9 months ago
- ☆18Updated 3 years ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Updated 2 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆97Updated 3 years ago
- ☆13Updated last year