A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security and NDSS).
☆338Nov 11, 2025Updated 3 months ago
Alternatives and similar repositories for Awesome-ML-SP-Papers
Users that are interested in Awesome-ML-SP-Papers are comparing it to the libraries listed below
Sorting:
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- Seminar 2022☆23Updated this week
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆16Oct 14, 2024Updated last year
- ☆31Sep 22, 2024Updated last year
- A list of backdoor learning resources☆1,160Jul 31, 2024Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆135Apr 17, 2025Updated 10 months ago
- A reading list for large models safety, security, and privacy (including Awesome LLM Security, Safety, etc.).☆1,879Updated this week
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆287Jan 11, 2025Updated last year
- A collection of security papers on top-tier publications☆60Updated this week
- The open-sourced Python toolbox for backdoor attacks and defenses.☆646Sep 27, 2025Updated 5 months ago
- ☆14Feb 26, 2025Updated last year
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆33Sep 23, 2023Updated 2 years ago
- An awesome list of papers on privacy attacks against machine learning☆634Mar 18, 2024Updated last year
- ☆585Jul 4, 2025Updated 8 months ago
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆179May 21, 2025Updated 9 months ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- A curated list of papers for the transferability of adversarial examples☆76Jul 8, 2024Updated last year
- ☆25Nov 14, 2022Updated 3 years ago
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- Papers and resources related to the security and privacy of LLMs 🤖☆570Jun 8, 2025Updated 9 months ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆236Mar 15, 2024Updated last year
- ☆20Oct 28, 2025Updated 4 months ago
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆28Mar 24, 2025Updated 11 months ago
- Code for the paper: Label-Only Membership Inference Attacks☆68Sep 11, 2021Updated 4 years ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆76Sep 4, 2024Updated last year
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆23Oct 30, 2023Updated 2 years ago
- ☆54Jun 30, 2023Updated 2 years ago
- ☆44Apr 25, 2023Updated 2 years ago
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆378Feb 5, 2023Updated 3 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Nov 5, 2024Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆109Sep 27, 2024Updated last year
- 😎 up-to-date & curated list of awesome Attacks on Large-Vision-Language-Models papers, methods & resources.☆505Feb 17, 2026Updated 2 weeks ago
- A curated list of academic events on AI Security & Privacy☆168Aug 22, 2024Updated last year
- Machine Learning & Security Seminar @Purdue University☆25May 9, 2023Updated 2 years ago
- ☆14Mar 9, 2025Updated last year
- ☆18Nov 13, 2021Updated 4 years ago
- Code repository for the paper "Heuristic Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models"☆15Aug 7, 2025Updated 7 months ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago