grasses / PromptCARE
Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.
☆30Updated 7 months ago
Alternatives and similar repositories for PromptCARE:
Users that are interested in PromptCARE are comparing it to the libraries listed below
- ☆34Updated 2 years ago
- ☆19Updated 10 months ago
- ☆17Updated 3 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated 11 months ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆18Updated 2 years ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆20Updated last year
- A toolbox for backdoor attacks.☆21Updated 2 years ago
- ☆19Updated 2 years ago
- ☆79Updated 3 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆16Updated last year
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆28Updated 2 months ago
- [IEEE S&P 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆21Updated 2 months ago
- Code release for DeepJudge (S&P'22)☆51Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆55Updated 11 months ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆18Updated last year
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆35Updated last year
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆30Updated 4 months ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 2 years ago
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆13Updated 2 months ago
- ☆20Updated last year
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆54Updated 2 years ago
- ☆13Updated last year
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆18Updated 3 weeks ago
- ☆13Updated 3 years ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆17Updated 7 months ago
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆20Updated 3 weeks ago
- ☆30Updated 3 years ago
- ☆18Updated last year
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆17Updated last year
- ☆18Updated 2 years ago