BrainWash: A Poisoning Attack to Forget in Continual Learning
☆12Apr 15, 2024Updated last year
Alternatives and similar repositories for Brainwash
Users that are interested in Brainwash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation of backdoor unlearning.☆21Jun 8, 2022Updated 3 years ago
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- ☆17Feb 25, 2024Updated 2 years ago
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆16Oct 24, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- [NeurIPS24] "What makes unlearning hard and what to do about it" [NeurIPS24] "Scalability of memorization-based machine unlearning"☆21May 24, 2025Updated 10 months ago
- Official repo for NeurIPS'24 paper "WAGLE: Strategic Weight Attribution for Effective and Modular Unlearning in Large Language Models"☆19Dec 16, 2024Updated last year
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- ☆13Nov 2, 2023Updated 2 years ago
- [NeurIPS 2024] Official implementation of the paper “Ferrari: Federated Feature Unlearning via Optimizing Feature Sensitivity"☆23Feb 13, 2026Updated last month
- anonymous github for SGSR: Beyond Social Homophily: Score-based Generative Diffusion Models for Social Recommendations☆12Sep 18, 2025Updated 6 months ago
- Download Huggingface repositories without the need to install dependencies☆22Jul 30, 2025Updated 7 months ago
- Transmute AI Lab Model Efficiency Toolkit☆19Oct 2, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Few-shot Learning with Auxiliary Data☆31Dec 8, 2023Updated 2 years ago
- ☆18Nov 28, 2023Updated 2 years ago
- Placeholder repository☆15Mar 16, 2022Updated 4 years ago
- 无线感知相关论文☆11Oct 26, 2021Updated 4 years ago
- Model Poisoning Attack to Federated Recommendation☆32Apr 23, 2022Updated 3 years ago
- ☆15Apr 27, 2024Updated last year
- Source code of FedAttack.☆11Feb 9, 2022Updated 4 years ago
- ☆12Nov 2, 2024Updated last year
- Tai-e学习记录☆19Apr 15, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This is the repository for USENIX Security 2023 paper "Hard-label Black-box Universal Adversarial Patch Attack".☆15Sep 5, 2023Updated 2 years ago
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆16May 12, 2024Updated last year
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆21Sep 18, 2021Updated 4 years ago
- Adversarial Driving v.s. Autonomous Driving.☆23Jul 29, 2023Updated 2 years ago
- code for GaVaMoE: Gaussian-Variational Gated Mixture of Experts for Explainable Recommendation☆18Dec 7, 2024Updated last year
- ☆21Aug 10, 2025Updated 7 months ago
- A data-free backdoor detector for deep neural networks☆21Mar 8, 2023Updated 3 years ago
- ☆12May 6, 2022Updated 3 years ago
- Clash for iOS☆38Mar 30, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- [WWW '25] Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability☆18May 30, 2025Updated 9 months ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Aug 28, 2021Updated 4 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆28Sep 11, 2024Updated last year
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆18Apr 25, 2025Updated 11 months ago
- ☆19Mar 9, 2024Updated 2 years ago
- 一键获取BJTU智慧课程平台全部作业☆24Sep 11, 2025Updated 6 months ago