fmy266 / Pytorch-Backdoor-UnlearningLinks
Pytorch implementation of backdoor unlearning.
☆19Updated 3 years ago
Alternatives and similar repositories for Pytorch-Backdoor-Unlearning
Users that are interested in Pytorch-Backdoor-Unlearning are comparing it to the libraries listed below
Sorting:
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆56Updated 6 months ago
- ☆70Updated 3 years ago
- The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".☆34Updated 2 years ago
- verifying machine unlearning by backdooring☆20Updated 2 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆32Updated 4 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆50Updated 2 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- ☆45Updated 5 years ago
- ☆19Updated 9 months ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆30Updated 3 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- ☆12Updated 2 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆65Updated 3 years ago
- FLTracer: Accurate Poisoning Attack Provenance in Federated Learning☆22Updated last year
- ☆38Updated 4 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 2 years ago
- ☆24Updated 2 years ago
- ☆25Updated 3 years ago
- Adversarial attacks and defenses against federated learning.☆17Updated 2 years ago
- ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341☆73Updated 2 years ago
- ☆31Updated 9 months ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆70Updated last year
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 2 years ago
- ☆26Updated last year
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆41Updated 5 months ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆19Updated 2 years ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆38Updated last year
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆62Updated 8 months ago
- ☆55Updated 2 years ago
- ☆20Updated last year