Implementations and demo of a regular Backdoor and a Latent backdoor attack on Deep Neural Networks.
☆19Jul 9, 2022Updated 3 years ago
Alternatives and similar repositories for neural-network-backdoors
Users that are interested in neural-network-backdoors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆23Sep 8, 2021Updated 4 years ago
- This is for the papers I review every week☆14May 20, 2020Updated 6 years ago
- ☆14Apr 11, 2024Updated 2 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Dec 2, 2020Updated 5 years ago
- ☆19Mar 26, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Apr 15, 2024Updated 2 years ago
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- ☆18Aug 15, 2022Updated 3 years ago
- ☆20Jun 5, 2023Updated 2 years ago
- A simple implementation of BadNets on MNIST☆34Jul 29, 2019Updated 6 years ago
- ☆27Nov 9, 2022Updated 3 years ago
- The NS-3 simulation code for MPTCP(Multiple Path TCP) in 802.11ad WiGig and Wi-Fi☆16Sep 26, 2023Updated 2 years ago
- ☆26Jan 11, 2023Updated 3 years ago
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆23Aug 10, 2022Updated 3 years ago
- Reinforcement Learning for Energy Imbalance Management using Voltage Control on TCLs☆12Jan 4, 2020Updated 6 years ago
- Example TrojAI Submission☆27Dec 6, 2024Updated last year
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- WateRF: Robust Watermarks in Radiance Fields for Protection of Copyrights (CVPR 2024) - Official Pytorch Code☆19May 11, 2026Updated last week
- Some literature published on topics around IoT & Cybersecurity☆14Oct 13, 2025Updated 7 months ago
- Text file containing NSFW words aggregated from various sources.☆11Aug 23, 2020Updated 5 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆13Apr 28, 2023Updated 3 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- EP-SAM: Weakly Supervised Histopathology Segmentation via Enhanced Prompt with Segment Anything☆18Dec 9, 2024Updated last year
- Code for the papers: "Stop Throwing Away Discriminators! Re-using Adversaries for Test-Time Training", Valvano et al., DART 2021; and "Re…☆10Jan 20, 2022Updated 4 years ago
- 一个快速扫描dns域传输漏洞的脚本(ZTdns is a quick script to scan for DNS zone transfer vulnerabilities)☆14Apr 7, 2024Updated 2 years ago
- ☆29Aug 21, 2023Updated 2 years ago
- The open-sourced Python toolbox for backdoor attacks and defenses.☆661Sep 27, 2025Updated 7 months ago
- ☆14Nov 19, 2021Updated 4 years ago
- MPTCP Deep Reinforcement Learning☆13Jun 22, 2018Updated 7 years ago
- ☆13Apr 27, 2018Updated 8 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Feb 17, 2016Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Feb 5, 2021Updated 5 years ago
- This repository was created as an implementation approach for a project on "Watermarking Deep Neural Networks".☆29Nov 16, 2020Updated 5 years ago
- ☆19Feb 18, 2024Updated 2 years ago
- Repository for Offline Visual Representation Learning v1 and v2☆13Jan 24, 2023Updated 3 years ago
- Computer networks course design.☆14Jan 26, 2019Updated 7 years ago
- 一键给文件夹中所有的代码添加注释的应用☆14Dec 21, 2023Updated 2 years ago
- ☆11Jul 5, 2023Updated 2 years ago