[WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability
☆18May 30, 2025Updated 9 months ago
Alternatives and similar repositories for TransTroj
Users that are interested in TransTroj are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Feb 21, 2022Updated 4 years ago
- ☆25Jun 23, 2021Updated 4 years ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆41Mar 19, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆14Jun 6, 2023Updated 2 years ago
- Official Inplementation of CVPR23 paper "Backdoor Defense via Deconfounded Representation Learning"☆25Mar 13, 2023Updated 3 years ago
- ☆23Dec 14, 2023Updated 2 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆237Mar 15, 2024Updated 2 years ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆17Feb 16, 2025Updated last year
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆20Jan 24, 2024Updated 2 years ago
- [CVPR 2023] "TrojViT: Trojan Insertion in Vision Transformers" by Mengxin Zheng, Qian Lou, Lei Jiang☆14Jan 5, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- ☆83Aug 3, 2021Updated 4 years ago
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆35Jan 9, 2023Updated 3 years ago
- ☆28Aug 21, 2023Updated 2 years ago
- Code for the paper Boosting Accuracy and Robustness of Student Models via Adaptive Adversarial Distillation (CVPR 2023).☆34May 26, 2023Updated 2 years ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- A compact toolbox for backdoor attacks and defenses.☆191Jul 16, 2024Updated last year
- Implementation of the ICIP paper "GPU-ACCELERATED SIFT-AIDED SOURCE IDENTIFICATION OF STABILIZED VIDEOS"☆11Oct 6, 2023Updated 2 years ago
- FedBERT : A federated approach that enables clients with limited computing resource to participate without violating data privacy.☆14Jul 3, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A deep neural net approach to nanostructure analysis in scanning electron microscope (SEM) images.☆12Jun 30, 2020Updated 5 years ago
- ☆20Oct 28, 2025Updated 4 months ago
- Compile-time Evaluable SHA3 in C++: Permutation-based Cryptographic Hashing☆16Mar 5, 2026Updated 3 weeks ago
- (b)ash script using curl for duodian Internet login in Chongqing University☆12Mar 27, 2022Updated 3 years ago
- There are my Pytorch codes for charactering adversarial subspace using local intrinsic dimensionality.☆13Apr 26, 2022Updated 3 years ago
- ☆14Dec 12, 2023Updated 2 years ago
- Backdoor Stuff in AI/ ML domain☆35Updated this week
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆16Oct 24, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Mar 24, 2023Updated 3 years ago
- ☆12Jan 25, 2025Updated last year
- Confidence Regulation Neurons in Language Models (NeurIPS 2024)☆15Feb 1, 2025Updated last year
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Dec 24, 2023Updated 2 years ago
- MSR LatticeCrypto library http://research.microsoft.com/en-us/projects/latticecrypto/☆14May 25, 2016Updated 9 years ago
- 无线感知相关论文☆11Oct 26, 2021Updated 4 years ago
- A Python package with integrated lncRNA prediction methods☆13Feb 17, 2021Updated 5 years ago