[WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability
☆18May 30, 2025Updated 9 months ago
Alternatives and similar repositories for TransTroj
Users that are interested in TransTroj are comparing it to the libraries listed below
Sorting:
- ☆30Sep 3, 2024Updated last year
- ☆11Feb 21, 2022Updated 4 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- ☆22Dec 14, 2023Updated 2 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆18Feb 16, 2025Updated last year
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆23Mar 23, 2024Updated last year
- Official Inplementation of CVPR23 paper "Backdoor Defense via Deconfounded Representation Learning"☆25Mar 13, 2023Updated 2 years ago
- ☆25Jun 23, 2021Updated 4 years ago
- Backdoor Stuff in AI/ ML domain☆35Feb 23, 2026Updated last week
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆35Jan 9, 2023Updated 3 years ago
- Simulator.☆101Apr 21, 2025Updated 10 months ago
- Implementation of the ICIP paper "GPU-ACCELERATED SIFT-AIDED SOURCE IDENTIFICATION OF STABILIZED VIDEOS"☆11Oct 6, 2023Updated 2 years ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- ☆118Jul 2, 2024Updated last year
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- ☆11Mar 24, 2023Updated 2 years ago
- ☆12Nov 2, 2024Updated last year
- ☆20Feb 3, 2025Updated last year
- BLEU Score in Rust☆12Updated this week
- (b)ash script using curl for duodian Internet login in Chongqing University☆12Mar 27, 2022Updated 3 years ago
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated last week
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- ☆11Aug 28, 2024Updated last year
- A compact toolbox for backdoor attacks and defenses.☆191Jul 16, 2024Updated last year
- The reinforcement learning codes for dataset SPA-VL☆44Jun 24, 2024Updated last year
- This is the official repo of the paper "Latent Guard: a Safety Framework for Text-to-image Generation"☆52Oct 24, 2024Updated last year
- 无线感知相关论文☆11Oct 26, 2021Updated 4 years ago
- 给科研小白的一些资源与工具推荐☆17Jul 6, 2020Updated 5 years ago
- ☆14Apr 4, 2019Updated 6 years ago
- ☆11Apr 3, 2024Updated last year
- a real-time multi-player three.js game☆12May 3, 2024Updated last year
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- ☆12Aug 12, 2024Updated last year
- Official frontend web application for Moltbook - The Social Network for AI Agents. Built with Next.js 14, TypeScript, Tailwind CSS featur…☆34Feb 1, 2026Updated last month
- Confidence Regulation Neurons in Language Models (NeurIPS 2024)☆15Feb 1, 2025Updated last year