nazmul-karim170 / FIPView external linksLinks
[CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"
☆14Oct 29, 2025Updated 3 months ago
Alternatives and similar repositories for FIP
Users that are interested in FIP are comparing it to the libraries listed below
Sorting:
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆11Jan 3, 2026Updated last month
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- ☆12Mar 5, 2024Updated last year
- Official implementation for paper "FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning" (NeurIPS 2023).☆13Oct 25, 2024Updated last year
- ☆12Mar 25, 2020Updated 5 years ago
- ☆15Apr 7, 2023Updated 2 years ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Jan 15, 2025Updated last year
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆36Oct 29, 2025Updated 3 months ago
- [CCS 2024] "BadMerging: Backdoor Attacks Against Model Merging": official code implementation.☆35Aug 22, 2024Updated last year
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆16Oct 14, 2024Updated last year
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated last year
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- ☆19Mar 26, 2022Updated 3 years ago
- [NeurIPS 2025 D&B] BackdoorDM: A Comprehensive Benchmark for Backdoor Learning in Diffusion Model☆24Aug 1, 2025Updated 6 months ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Dec 24, 2023Updated 2 years ago
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification☆16Oct 31, 2023Updated 2 years ago
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆48Apr 27, 2022Updated 3 years ago
- Backdooring Multimodal Learning☆30May 4, 2023Updated 2 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆49Apr 8, 2024Updated last year
- ☆27Feb 1, 2023Updated 3 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Nov 16, 2022Updated 3 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Apr 5, 2022Updated 3 years ago
- ☆27Nov 9, 2022Updated 3 years ago
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆27Apr 15, 2025Updated 9 months ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Dec 31, 2024Updated last year
- Backdoor Stuff in AI/ ML domain☆34Updated this week
- Codes for Dual Stealthy Backdoor☆13Feb 10, 2024Updated 2 years ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code☆12Oct 7, 2025Updated 4 months ago
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆35Jan 9, 2023Updated 3 years ago
- ☆12May 6, 2022Updated 3 years ago
- ☆32Mar 4, 2022Updated 3 years ago
- ☆11Oct 30, 2024Updated last year
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- CCS Tools☆13Sep 4, 2023Updated 2 years ago
- A POC for a mutual fund listing app with a user signup/signin flow that displays multiple mutual funds in a scrollable list. Certain esse…☆10Feb 1, 2023Updated 3 years ago
- ☆12Oct 28, 2023Updated 2 years ago
- Privacy-Preserving Dynamic Learning of Tor Network Traffic☆10Jun 15, 2021Updated 4 years ago
- using yolov5 to detect whether people fall down or not☆11May 9, 2023Updated 2 years ago