☆20Feb 17, 2020Updated 6 years ago
Alternatives and similar repositories for DeepConfuse
Users that are interested in DeepConfuse are comparing it to the libraries listed below
Sorting:
- ☆10Jul 28, 2022Updated 3 years ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 3 years ago
- ☆18Nov 13, 2021Updated 4 years ago
- ☆54Sep 11, 2021Updated 4 years ago
- Code for "Neural Tangent Generalization Attacks" (ICML 2021)☆41Jul 29, 2021Updated 4 years ago
- ☆69Feb 17, 2024Updated 2 years ago
- [ICLR 2025] Image watermarks are removable using controllable regeneration from clean noise☆28Feb 17, 2025Updated last year
- ☆19Nov 14, 2024Updated last year
- Implementation of paper 'Reversing the Forget-Retain Objectives: An Efficient LLM Unlearning Framework from Logit Difference' [NeurIPS'24…☆26Jun 14, 2024Updated last year
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- Unofficial PyTorch implementation of the paper "Feature Importance-aware Transferable Adversarial Attacks"☆11Oct 28, 2025Updated 4 months ago
- Code for the WWW21 paper "Not All Features Are Equal: Discovering Essential Features for Preserving Prediction Privacy"☆12Feb 15, 2021Updated 5 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Oct 25, 2019Updated 6 years ago
- Official repo for [CVPR2025 Oral] Black-Box Forgery Attacks on Semantic Watermarks for Diffusion Models☆33Nov 19, 2025Updated 4 months ago
- One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks (ICLR 2023 Spotlight)☆14Sep 28, 2025Updated 5 months ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- Code for Auditing DPSGD☆39Feb 15, 2022Updated 4 years ago
- Backdoor Stuff in AI/ ML domain☆35Mar 7, 2026Updated 2 weeks ago
- ☆32Aug 9, 2024Updated last year
- ☆17Jun 25, 2024Updated last year
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- Code for "Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders" at ICML 2024☆10Sep 18, 2025Updated 6 months ago
- An experimental implementation of a treasury system based on Scorex framework☆13Jan 17, 2020Updated 6 years ago
- Webank AI☆42Feb 19, 2025Updated last year
- [Findings of ACL 2023] Communication Efficient Federated Learning for Multilingual Machine Translation with Adapter☆12Sep 4, 2023Updated 2 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- [ECCV24] "Challenging Forgets: Unveiling the Worst-Case Forget Sets in Machine Unlearning" by Chongyu Fan*, Jiancheng Liu*, Alfred Hero, …☆25May 27, 2025Updated 9 months ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- ☆33Nov 27, 2023Updated 2 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- Implementation for <Understanding Robust Overftting of Adversarial Training and Beyond> in ICML'22.☆13Jul 1, 2022Updated 3 years ago
- [Under Progress] Code & Data for the AAAI 2020 Paper "Likelihood Ratios and Generative Classifiers For Unsupervised OOD Detection In Task…☆10Jul 25, 2024Updated last year
- ☆13Mar 14, 2022Updated 4 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- ☆13May 27, 2024Updated last year
- simple Differential Privacy in PyTorch☆49May 29, 2020Updated 5 years ago