A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security and NDSS).
☆340Nov 11, 2025Updated 4 months ago
Alternatives and similar repositories for Awesome-ML-SP-Papers
Users that are interested in Awesome-ML-SP-Papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- Seminar 2022☆23Mar 19, 2026Updated last week
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆16Oct 14, 2024Updated last year
- ☆31Sep 22, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A list of backdoor learning resources☆1,163Jul 31, 2024Updated last year
- A reading list for large models safety, security, and privacy (including Awesome LLM Security, Safety, etc.).☆1,911Mar 16, 2026Updated last week
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆138Apr 17, 2025Updated 11 months ago
- A collection of security papers on top-tier publications☆61Mar 15, 2026Updated 2 weeks ago
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆287Jan 11, 2025Updated last year
- The open-sourced Python toolbox for backdoor attacks and defenses.☆651Sep 27, 2025Updated 6 months ago
- ☆592Jul 4, 2025Updated 8 months ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆33Sep 23, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The codes for 'Non-Exemplar Online Class-incremental Continual Learning via Dual-prototype Self-augment and Refinement'☆30Mar 21, 2024Updated 2 years ago
- accepted by ieee sensors journal☆33Aug 30, 2020Updated 5 years ago
- ☆14Feb 26, 2025Updated last year
- The codes for 'Progressive cross-primitive consistency for open-world compositional zero-shot learning'☆31Mar 21, 2024Updated 2 years ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆237Mar 15, 2024Updated 2 years ago
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆181May 21, 2025Updated 10 months ago
- ☆18Apr 4, 2021Updated 4 years ago
- An awesome list of papers on privacy attacks against machine learning☆633Mar 18, 2024Updated 2 years ago
- A curated list of papers for the transferability of adversarial examples☆76Jul 8, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆33Jun 25, 2022Updated 3 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- Papers and resources related to the security and privacy of LLMs 🤖☆569Jun 8, 2025Updated 9 months ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆75Sep 4, 2024Updated last year
- ☆54Jun 30, 2023Updated 2 years ago
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆23Oct 30, 2023Updated 2 years ago
- ☆20Oct 28, 2025Updated 5 months ago
- Codes for Three-stream Interaction Decoder Network for RGB-Thermal Salient Object Detection☆27May 12, 2022Updated 3 years ago
- ☆43Mar 21, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆28Mar 24, 2025Updated last year
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- A curated list of academic events on AI Security & Privacy☆168Aug 22, 2024Updated last year
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆377Feb 5, 2023Updated 3 years ago
- ☆25Nov 14, 2022Updated 3 years ago
- A compact toolbox for backdoor attacks and defenses.☆191Jul 16, 2024Updated last year
- ☆44Apr 25, 2023Updated 2 years ago