☆20Feb 17, 2020Updated 6 years ago
Alternatives and similar repositories for DeepConfuse
Users that are interested in DeepConfuse are comparing it to the libraries listed below
Sorting:
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- ☆10Jul 28, 2022Updated 3 years ago
- Code for "Neural Tangent Generalization Attacks" (ICML 2021)☆41Jul 29, 2021Updated 4 years ago
- [ICLR 2025] Image watermarks are removable using controllable regeneration from clean noise☆26Feb 17, 2025Updated last year
- Improved DP-SGD for optimizing☆20Mar 23, 2019Updated 6 years ago
- ☆18Nov 13, 2021Updated 4 years ago
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- ☆54Sep 11, 2021Updated 4 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Oct 25, 2019Updated 6 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- Backdoor Stuff in AI/ ML domain☆34Feb 23, 2026Updated last week
- ☆69Feb 17, 2024Updated 2 years ago
- ☆33Nov 27, 2023Updated 2 years ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Feb 11, 2026Updated 2 weeks ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- webPack3.0+版本 超详细 Example(代码内带有详细注释)☆10May 12, 2019Updated 6 years ago
- ☆12May 6, 2022Updated 3 years ago
- Self-hosted Todolist app written in Python☆10Apr 16, 2021Updated 4 years ago
- 自己用ts写的一个简单a星寻路算法游戏☆10Nov 28, 2021Updated 4 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆46Apr 15, 2025Updated 10 months ago
- ☆10Jul 8, 2020Updated 5 years ago
- ☆11Oct 30, 2024Updated last year
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- ☆11Dec 9, 2018Updated 7 years ago
- fixed point math library for deterministic lockstep network game in Unity☆13Aug 12, 2021Updated 4 years ago
- Code for Auditing DPSGD☆37Feb 15, 2022Updated 4 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- really example for goldvideo project☆11Sep 27, 2023Updated 2 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- ☆10Jun 3, 2019Updated 6 years ago
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- 如何制作简易的HTML5幻灯片☆14Jan 31, 2018Updated 8 years ago
- DeepREAL: A Deep Learning Powered Multi-scale Modeling Framework Towards Predicting Out-of-distribution Receptor Activity of Ligand Bindi…☆11Apr 23, 2022Updated 3 years ago
- ☆12Jan 25, 2025Updated last year
- An experimental implementation of a treasury system based on Scorex framework☆13Jan 17, 2020Updated 6 years ago
- Code for "Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders" at ICML 2024☆10Sep 18, 2025Updated 5 months ago
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Jan 27, 2025Updated last year