联邦学习,后门攻击,简单实现
☆28May 14, 2024Updated last year
Alternatives and similar repositories for federated_backdoor_attack
Users that are interested in federated_backdoor_attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Backdoor Stuff in AI/ ML domain☆35Mar 21, 2026Updated last week
- ☆12Oct 26, 2023Updated 2 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- Blockchain federated learning simulate by python☆10May 29, 2023Updated 2 years ago
- [USENIX Security'24] Lotto: Secure Participant Selection against Adversarial Servers in Federated Learning☆21Apr 28, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Implementation of BapFL: You can Backdoor Attack Personalized Federated Learning☆15Sep 18, 2023Updated 2 years ago
- IBA: Towards Irreversible Backdoor Attacks in Federated Learning (Poster at NeurIPS 2023)☆40Sep 10, 2025Updated 6 months ago
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆47Sep 10, 2025Updated 6 months ago
- A simple Asynchronous Federated Learning!☆11Dec 24, 2024Updated last year
- Official implementation of Resisting Backdoor Attacks in Federated Learning via Bidirectional Elections and Individual Perspective☆13Sep 4, 2024Updated last year
- [AAAI 2025] Label-Free Backdoor Attacks in Vertical Federated Learning☆20Apr 14, 2025Updated 11 months ago
- ☆17Feb 6, 2025Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- 校园音乐征集投票系统 A system for electing annual school music☆10Mar 13, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆10Apr 15, 2023Updated 2 years ago
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated 3 months ago
- ☆11May 14, 2024Updated last year
- Taurix OS kernel. Taurix 系统内核,操作系统原理实(xjb)践(写)☆12Dec 20, 2020Updated 5 years ago
- An Efficent BPE Algorithm Faster then Hugging Face Tokenizer's Implementation☆13Sep 9, 2024Updated last year
- 一套手写数字识别程序,可以组合使用不同的特征,采用维规约技术进行降维,并采用不同的分类器识别手写数字,并输出结果,进行比较。☆12Jan 16, 2016Updated 10 years ago
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- OnlineJudge 一键安装脚本☆13Aug 6, 2021Updated 4 years ago
- ☆13Feb 29, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- [ACM Computing Survey 2025] Vertical Federated Learning for Effectiveness, Security, Applicability: A Survey, by MARS Group at Wuhan Univ…☆23Apr 9, 2025Updated 11 months ago
- ☆15May 22, 2023Updated 2 years ago
- ☆14Nov 11, 2025Updated 4 months ago
- ☆15Jan 17, 2024Updated 2 years ago
- PyTorch implementation of ICML 2017 paper, SplitNet: Learning to Semantically Split Deep Networks for Parameter Reduction and Model Paral…☆17Oct 24, 2017Updated 8 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- Fixing SySeVR.☆12Sep 23, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 同济大学计科机器学习大作业☆10Mar 22, 2025Updated last year
- ☆14Jul 21, 2020Updated 5 years ago
- ☆17Sep 17, 2023Updated 2 years ago
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year
- Implementation fo Zorro: Valid, Sparse, and Stable Explanations in Graph Neural Networks☆16Aug 31, 2022Updated 3 years ago
- To learn function representations from multi-domain knowledge bases for software vulnerability detection.☆15Aug 15, 2020Updated 5 years ago
- ☆17Jun 25, 2024Updated last year