haowang02 / TransTrojLinks
[WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability
☆17Updated 6 months ago
Alternatives and similar repositories for TransTroj
Users that are interested in TransTroj are comparing it to the libraries listed below
Sorting:
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆129Updated last year
- ☆26Updated 2 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Updated last year
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆32Updated 4 years ago
- ☆20Updated 3 years ago
- ☆31Updated 3 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆102Updated 3 years ago
- Composite Backdoor Attacks Against Large Language Models☆20Updated last year
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆225Updated last year
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Updated last year
- A toolbox for backdoor attacks.☆22Updated 2 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Updated 2 years ago
- [NDSS'25] The official implementation of safety misalignment.☆17Updated 10 months ago
- ☆16Updated last year
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆26Updated 4 months ago
- ☆84Updated 4 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆84Updated 2 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated 5 months ago
- ☆16Updated last year
- A list of recent papers about adversarial learning☆251Updated last week
- ☆37Updated last year
- Source code and scripts for the paper "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks"☆20Updated 11 months ago
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆40Updated last year
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆280Updated 10 months ago
- ☆27Updated 3 years ago
- ☆26Updated last year
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated 2 years ago
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆45Updated 3 years ago
- Code Repository for the Paper ---Revisiting the Assumption of Latent Separability for Backdoor Defenses (ICLR 2023)☆44Updated 2 years ago
- ☆36Updated last year