Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'
☆55Mar 24, 2021Updated 5 years ago
Alternatives and similar repositories for manip-ml
Users that are interested in manip-ml are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆119Jun 3, 2019Updated 6 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Mar 28, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Seminar 2016☆25Aug 19, 2024Updated last year
- code for model-targeted poisoning☆12Oct 3, 2023Updated 2 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 5 years ago
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Jul 16, 2021Updated 4 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆14Aug 22, 2022Updated 3 years ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆21Aug 15, 2022Updated 3 years ago
- ☆27Oct 17, 2022Updated 3 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆318Feb 28, 2020Updated 6 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Implementations of data poisoning attacks against neural networks and related defenses.☆105Jul 16, 2024Updated last year
- A unified benchmark problem for data poisoning attacks☆161Oct 4, 2023Updated 2 years ago
- ☆18Sep 29, 2020Updated 5 years ago
- Code for "Analyzing Federated Learning through an Adversarial Lens" https://arxiv.org/abs/1811.12470☆153Oct 3, 2022Updated 3 years ago
- 2021 Machine Learning Security Evasion Competition☆13Sep 29, 2021Updated 4 years ago
- code for TPDS paper "Towards Fair and Privacy-Preserving Federated Deep Models"☆32Jun 16, 2022Updated 3 years ago
- A paper summary of Backdoor Attack against Neural Network☆13Aug 9, 2019Updated 6 years ago
- Code for "Imitation Attacks and Defenses for Black-box Machine Translations Systems"☆32May 1, 2020Updated 6 years ago
- Trojan Attack on Neural Network☆190Mar 25, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆27Dec 15, 2022Updated 3 years ago
- ☆106Oct 19, 2020Updated 5 years ago
- In this notebook i implement clinical text classfication on the medical transcription dataset from kaggle☆15Jul 14, 2020Updated 5 years ago
- Experiments on Data Poisoning Regression Learning☆12Oct 5, 2020Updated 5 years ago
- A Python package that demontrates arbitrary code execution during the install process of a Python package.☆11Sep 28, 2014Updated 11 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 8 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆56May 28, 2019Updated 6 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- RISC-V Security HC admin repo☆17Jan 7, 2025Updated last year
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- Distributional Shapley: A Distributional Framework for Data Valuation☆31May 1, 2024Updated 2 years ago
- ☆65Jul 30, 2019Updated 6 years ago
- ☆22Sep 17, 2024Updated last year
- ☆11Feb 27, 2022Updated 4 years ago