dgl-prc / m_testing_adversatial_sampleLinks
☆27Updated 5 years ago
Alternatives and similar repositories for m_testing_adversatial_sample
Users that are interested in m_testing_adversatial_sample are comparing it to the libraries listed below
Sorting:
- Code release for RobOT (ICSE'21)☆15Updated 2 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆71Updated 7 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆101Updated 7 years ago
- ☆15Updated 5 years ago
- ☆66Updated 5 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆60Updated 11 months ago
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆48Updated 6 years ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆51Updated 3 years ago
- ☆99Updated 5 years ago
- ☆19Updated 3 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆12Updated 3 years ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Updated 9 months ago
- ☆149Updated last year
- ☆19Updated 4 years ago
- ☆25Updated 4 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated last year
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆18Updated 3 weeks ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Updated 11 months ago
- ☆87Updated 4 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 3 years ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆20Updated 4 years ago
- ☆84Updated 4 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆35Updated last year
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Updated 6 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Updated 10 months ago
- Trojan Attack on Neural Network☆188Updated 3 years ago
- ☆53Updated 3 years ago
- Adversarial Examples on KNN (and its neural network friends)☆20Updated 5 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆74Updated 7 years ago