[PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
☆17Feb 27, 2021Updated 5 years ago
Alternatives and similar repositories for Poison-Frogs-OneShotKillAttack-PyTorch
Users that are interested in Poison-Frogs-OneShotKillAttack-PyTorch are comparing it to the libraries listed below
Sorting:
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆18May 13, 2019Updated 6 years ago
- ☆22Sep 16, 2022Updated 3 years ago
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆26Jul 3, 2025Updated 8 months ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 7 years ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Jan 15, 2025Updated last year
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Dec 31, 2024Updated last year
- ☆13Jan 2, 2025Updated last year
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- ☆13Jun 4, 2025Updated 8 months ago
- Source code of the article "Deep PLS: A Lightweight Deep Learning Model for Interpretable and Efficient Data Analytics".☆19Sep 5, 2024Updated last year
- Official implementation of "Label Poisoning is All You Need".☆11Jan 4, 2024Updated 2 years ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆11Jan 3, 2026Updated last month
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆13Aug 25, 2021Updated 4 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- The implementatioin code of paper: “A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning”☆11Jul 1, 2023Updated 2 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- CoPur: Certifiably Robust Collaborative Inference via Feature Purification (NeurIPS 2022)☆11Dec 7, 2022Updated 3 years ago
- ☆12Nov 26, 2019Updated 6 years ago
- Source code of the paper "Deep Learning of Latent Variable Models for Industrial Process Monitoring".☆10Dec 18, 2021Updated 4 years ago
- [CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"☆14Oct 29, 2025Updated 4 months ago
- [ICLR 2025] On Evluating the Durability of Safegurads for Open-Weight LLMs☆13Jun 20, 2025Updated 8 months ago
- Python functions to estimate information entropy and mutual information of random variables/vectors (i.e. numpy arrays).☆12Feb 2, 2017Updated 9 years ago
- Completely remove Gemini’s SynthID security so it can’t detect that your image was made with AI. Simply clone the repository locally, run…☆26Dec 10, 2025Updated 2 months ago
- ☆12Mar 5, 2024Updated last year
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆38Jul 22, 2024Updated last year
- Code for our paper "Localizing Lying in Llama"☆13Apr 24, 2025Updated 10 months ago
- The implementation of FedHSSL algorithm published in the paper "A Hybrid Self-Supervised Learning Framework for Vertical Federated Learni…☆14Jul 13, 2024Updated last year
- This repository contains the official implementation of the paper entitled with "FedAPEN: Personalized Cross-silo Federated Learning with…☆14Dec 4, 2023Updated 2 years ago
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆12Jun 12, 2023Updated 2 years ago
- There are my Pytorch codes for charactering adversarial subspace using local intrinsic dimensionality.☆13Apr 26, 2022Updated 3 years ago
- ☆17Jun 25, 2024Updated last year
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆135Nov 11, 2024Updated last year
- The implementation of FedBCD algorithm published in the paper "FedBCD: A Communication-Efficient Collaborative Learning Framework for Dis…☆15Jul 2, 2024Updated last year
- Illustrate and code both PCA and KPCA.☆11Jun 30, 2019Updated 6 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- Contains implementation of denoising algorithms.☆11Jul 16, 2020Updated 5 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆63May 8, 2023Updated 2 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- ☆16Jul 23, 2022Updated 3 years ago