dunky11 / adversarial-frontier-stitchingLinks
Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.
☆25Updated 4 years ago
Alternatives and similar repositories for adversarial-frontier-stitching
Users that are interested in adversarial-frontier-stitching are comparing it to the libraries listed below
Sorting:
- ☆18Updated 3 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Updated 4 years ago
- ☆16Updated 3 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated last year
- ☆16Updated 3 years ago
- ☆48Updated 4 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Updated 3 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆18Updated 2 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆116Updated 2 years ago
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 2 years ago
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆45Updated 3 years ago
- Code for "Label-Consistent Backdoor Attacks"☆58Updated 4 years ago
- ☆66Updated last year
- ☆21Updated 5 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆92Updated 3 months ago
- ☆18Updated 2 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆128Updated 9 months ago
- ☆21Updated 2 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆72Updated last year
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆35Updated last year
- ☆82Updated 4 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆97Updated 3 years ago
- ☆24Updated 2 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆57Updated last year
- ☆53Updated 3 years ago
- ☆27Updated 2 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆20Updated 3 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Updated 2 years ago