inspire-group / OOD-AttacksView external linksLinks
Attacks using out-of-distribution adversarial examples
☆11Nov 19, 2019Updated 6 years ago
Alternatives and similar repositories for OOD-Attacks
Users that are interested in OOD-Attacks are comparing it to the libraries listed below
Sorting:
- verifying machine unlearning by backdooring☆20Mar 25, 2023Updated 2 years ago
- Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]☆50Apr 25, 2020Updated 5 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆31Apr 27, 2022Updated 3 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective, ICCV'17☆30Sep 15, 2018Updated 7 years ago
- ☆32Sep 2, 2024Updated last year
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- ☆10Jun 23, 2018Updated 7 years ago
- Research simulation toolkit for federated learning☆13Nov 7, 2020Updated 5 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 4 months ago
- ☆10May 18, 2024Updated last year
- Identification of the Adversary from a Single Adversarial Example (ICML 2023)☆10Jul 15, 2024Updated last year
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆39Dec 13, 2018Updated 7 years ago
- [NeurIPS 2023] Code for the paper "Revisiting Adversarial Training for ImageNet: Architectures, Training and Generalization across Threa…☆39Dec 3, 2024Updated last year
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 4 years ago
- A metric learning method to learn a provably robust Mahalanobis distance☆10Jan 29, 2022Updated 4 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- Official repo of the paper Deep Regression Unlearning accepted in ICML 2023☆14Jun 14, 2023Updated 2 years ago
- Dataset: UET Driver Activity Recognition☆10Apr 19, 2022Updated 3 years ago
- Unofficial Pytorch Implementation of "A Simple Framework for Contrastive Learning of Visual Representations"☆10Mar 11, 2020Updated 5 years ago
- El0ps: An Exact L0-Problem Solver☆13Jan 6, 2026Updated last month
- ☆18Aug 23, 2025Updated 5 months ago
- ☆10Jun 1, 2022Updated 3 years ago
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆12Aug 19, 2022Updated 3 years ago
- Federated principal component analysis (FPCA) is my master thesis, which aims to adapt PCA in a federated learning setting. The technique…☆11Apr 5, 2024Updated last year
- A study in multi-center imaging diagnostics, emphasizing on the modality of cardiovascular magnetic resonance and the prediction of hyper…☆11Jul 14, 2021Updated 4 years ago
- Machine learning project using federated learning for text generation☆11May 5, 2024Updated last year
- Simulation code for Federated Learning with Over-the-Air Computation.☆11Sep 11, 2020Updated 5 years ago
- Seminar: intro to deep learning with tensorflow☆13Jun 27, 2017Updated 8 years ago
- ☆11Apr 21, 2023Updated 2 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- ☆11Apr 4, 2022Updated 3 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Membership Inference Attack on Federated Learning☆12Jan 14, 2022Updated 4 years ago
- Detailed guide to help you understand how to train CRF as RNN☆10May 26, 2017Updated 8 years ago
- Source code for ACL2020: On the Robustness of Language Encoders against Grammatical Errors☆10Jul 6, 2023Updated 2 years ago
- Automated Classification of Overfitting Patches with Statically Extracted Code Features http://arxiv.org/pdf/1910.12057☆11Jan 13, 2023Updated 3 years ago