jiawangbai / TA-LBFView external linksLinks
The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
☆18Jul 20, 2021Updated 4 years ago
Alternatives and similar repositories for TA-LBF
Users that are interested in TA-LBF are comparing it to the libraries listed below
Sorting:
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Jun 7, 2021Updated 4 years ago
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆20Nov 7, 2020Updated 5 years ago
- A Fine-grained Differentially Private Federated Learning against Leakage from Gradients☆15Jan 18, 2023Updated 3 years ago
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆17Sep 1, 2023Updated 2 years ago
- Pytorch implementation of Bit-Flip based adversarial weight Attack (BFA)☆33Jul 3, 2021Updated 4 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- Implementation of HAT https://arxiv.org/pdf/2204.00993☆51Mar 23, 2024Updated last year
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Aug 18, 2020Updated 5 years ago
- Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder(CVPR2020)☆12Aug 25, 2020Updated 5 years ago
- ☆13Oct 21, 2021Updated 4 years ago
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆16Oct 24, 2024Updated last year
- [CVPR 2021] Pytorch implementation for Probabilistic Modeling of Semantic Ambiguity for Scene Graph Generation☆19May 7, 2021Updated 4 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago
- ☆19Mar 26, 2022Updated 3 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Implementation of TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems (https://arxiv.org/pdf/190…☆19Apr 13, 2023Updated 2 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 2 years ago
- ☆38Jun 10, 2021Updated 4 years ago
- SEAT☆21Oct 10, 2023Updated 2 years ago
- ☆15Mar 20, 2020Updated 5 years ago
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆75Dec 5, 2022Updated 3 years ago
- ☆20May 6, 2022Updated 3 years ago
- ☆19Aug 16, 2021Updated 4 years ago
- TIFS2022: Decision-based Adversarial Attack with Frequency Mixup☆22Aug 8, 2023Updated 2 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Feb 10, 2023Updated 3 years ago
- Codebase for "Exploring the Landscape of Spatial Robustness" (ICML'19, https://arxiv.org/abs/1712.02779).☆25Sep 16, 2019Updated 6 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- Towards Reverse-Engineering Black-Box Neural Networks, ICLR'18☆56Jun 7, 2019Updated 6 years ago
- MACER: MAximizing CErtified Radius (ICLR 2020)☆31Jan 5, 2020Updated 6 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Jul 22, 2023Updated 2 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 4 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Oct 18, 2022Updated 3 years ago
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆28Nov 25, 2022Updated 3 years ago
- Code for Adversarial Example Games NeurIPS 2020 Paper☆27Nov 27, 2024Updated last year