☆12Feb 21, 2022Updated 4 years ago
Alternatives and similar repositories for BadPre
Users that are interested in BadPre are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Jun 23, 2021Updated 4 years ago
- [WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability☆18May 30, 2025Updated 10 months ago
- ☆18Feb 10, 2022Updated 4 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- ☆19Mar 9, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A simple project to learn Flask.☆13Mar 31, 2020Updated 6 years ago
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆38Sep 25, 2023Updated 2 years ago
- ☆37Oct 17, 2024Updated last year
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated last month
- Starter kit and data loading code for the Trojan Detection Challenge NeurIPS 2022 competition☆33Jul 26, 2023Updated 2 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆203Apr 10, 2023Updated 3 years ago
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆12Aug 1, 2022Updated 3 years ago
- ☆29Aug 21, 2023Updated 2 years ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Jun 17, 2021Updated 4 years ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆45Jul 26, 2021Updated 4 years ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆51Jun 1, 2022Updated 3 years ago
- ☆14Dec 12, 2023Updated 2 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆63May 8, 2023Updated 2 years ago
- This repository contains the code and data download links to reproduce the experiments of the PVLDB paper "Dual-Objective Fine-Tuning of …☆16Jun 7, 2021Updated 4 years ago
- Claude Code is an agentic coding tool that lives in your terminal, understands your codebase, and helps you code faster by executing rout…☆96Mar 31, 2026Updated 2 weeks ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks…☆127Jan 18, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆46Oct 12, 2022Updated 3 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆132Oct 24, 2023Updated 2 years ago
- Official release of code for the paper RL is a hammer and LLMs are nails A simple RL approach to stronger prompt injection attacks☆43Updated this week
- ☆31Updated this week
- ☆12Sep 15, 2024Updated last year
- Working Memory Attack on LLMs☆17May 27, 2025Updated 10 months ago
- 最近几年三维场景表示相关工作的收集列表,重点关注深度学习相关的工作,包括Neural Radiance Field(NeRF),Signed Distance Funciton(SDF),Occupancy Field以及3D Gaussian Splatting等。不仅包…☆13Dec 16, 2023Updated 2 years ago
- 2020华为软挑初赛武长赛区第一,复赛A榜赛区第二解决方案☆12May 17, 2020Updated 5 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12May 27, 2022Updated 3 years ago
- ☆33Oct 21, 2025Updated 5 months ago
- "Gaussian RAM: Lightweight Image Classification via Stochastic Retina Inspired Glimpse and Reinforcement Learning" (ICCAS 2020)☆16Jun 7, 2022Updated 3 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- The official implementation of the paper "AgentDyn: A Dynamic Open-Ended Benchmark for Evaluating Prompt Injection Attacks of Real-World …☆43Updated this week
- Code of "Visualizing and Understanding Object Detecor"☆20Jun 24, 2021Updated 4 years ago
- This repository is made for medical image classification using Deep Reinforcement Learning☆17Jan 29, 2021Updated 5 years ago