[PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
☆17Feb 27, 2021Updated 5 years ago
Alternatives and similar repositories for Poison-Frogs-OneShotKillAttack-PyTorch
Users that are interested in Poison-Frogs-OneShotKillAttack-PyTorch are comparing it to the libraries listed below
Sorting:
- ☆22Sep 16, 2022Updated 3 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 7 years ago
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆27Jul 3, 2025Updated 8 months ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Dec 31, 2024Updated last year
- CoPur: Certifiably Robust Collaborative Inference via Feature Purification (NeurIPS 2022)☆11Dec 7, 2022Updated 3 years ago
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆48Apr 27, 2022Updated 3 years ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆12Jan 3, 2026Updated 2 months ago
- ☆12Mar 5, 2024Updated 2 years ago
- Official implementation of "Label Poisoning is All You Need".☆11Jan 4, 2024Updated 2 years ago
- The implementatioin code of paper: “A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning”☆11Jul 1, 2023Updated 2 years ago
- A simple consensus of PBFT☆13Dec 3, 2019Updated 6 years ago
- 一些常见攻击算法的实现☆16May 13, 2021Updated 4 years ago
- ☆13Jan 2, 2025Updated last year
- For tutorial☆10Oct 24, 2022Updated 3 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- This repository contains the official implementation of the paper entitled with "FedAPEN: Personalized Cross-silo Federated Learning with…☆14Dec 4, 2023Updated 2 years ago
- The implementation of FedHSSL algorithm published in the paper "A Hybrid Self-Supervised Learning Framework for Vertical Federated Learni…☆14Jul 13, 2024Updated last year
- This is an implementation of the paper: "Deep learning to detect botnet via network flow summaries" using Keras.☆11Mar 30, 2020Updated 5 years ago
- ☆20Apr 15, 2025Updated 11 months ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆38Jul 22, 2024Updated last year
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- ☆17Jun 25, 2024Updated last year
- ☆19Mar 26, 2022Updated 3 years ago
- Least Squares GANs in Tensorflow☆17Apr 20, 2017Updated 8 years ago
- Illustrate and code both PCA and KPCA.☆11Jun 30, 2019Updated 6 years ago
- ☆13Jun 4, 2025Updated 9 months ago
- Source code of the paper "Deep Learning of Latent Variable Models for Industrial Process Monitoring".☆10Dec 18, 2021Updated 4 years ago
- A simple PyTorch implementations of `Badnets: Identifying vulnerabilities in the machine learning model supply chain` on MNIST and CIFAR1…☆10May 19, 2021Updated 4 years ago
- ☆20Aug 7, 2023Updated 2 years ago
- Contains implementation of denoising algorithms.☆11Jul 16, 2020Updated 5 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆62May 8, 2023Updated 2 years ago
- ☆16Jul 23, 2022Updated 3 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- [ICLR 2025] On Evluating the Durability of Safegurads for Open-Weight LLMs☆13Jun 20, 2025Updated 9 months ago
- 数字水印project,基于DWT的图像水印项目☆11Jun 22, 2023Updated 2 years ago
- Official PyTorch Implementation of PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection (CVPR 2025).☆34Jul 7, 2025Updated 8 months ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- Source code of the article "Deep PLS: A Lightweight Deep Learning Model for Interpretable and Efficient Data Analytics".☆19Sep 5, 2024Updated last year