☆46Feb 16, 2026Updated last month
Alternatives and similar repositories for SecureChain
Users that are interested in SecureChain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Jan 15, 2025Updated last year
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆22Oct 5, 2025Updated 6 months ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- Official Implementation of NeurIPS 2024 paper - BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens☆29Feb 17, 2026Updated last month
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Mar 28, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆16Dec 29, 2023Updated 2 years ago
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆36Sep 25, 2023Updated 2 years ago
- ☆20Feb 11, 2024Updated 2 years ago
- Machine Learning & Security Seminar @Purdue University☆25May 9, 2023Updated 2 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Dec 31, 2024Updated last year
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 6 months ago
- ☆18Aug 15, 2022Updated 3 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆28Feb 21, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆18Mar 10, 2025Updated last year
- ☆13Apr 28, 2025Updated 11 months ago
- Mechanized baselines for various type system features☆18Apr 3, 2026Updated last week
- [CVPR'25] CO-SPY: Combining Semantic and Pixel Features to Detect Synthetic Images by AI☆43Jan 8, 2026Updated 3 months ago
- piggybacking on the Dafny language implementation to explore interactive semi-automated verified program synthesis, combining LLMs and sy…☆16Mar 26, 2026Updated 2 weeks ago
- Replication package for the paper "Systematically Covering Input Structure" published at ASE 2019☆10Jul 6, 2023Updated 2 years ago
- Compositional Verification of Composite Byzantine Protocols☆13Aug 24, 2024Updated last year
- Code for EMNLP 2020 paper: Analogous Process Structure Induction for Sub-event Sequence Prediction☆11Oct 19, 2020Updated 5 years ago
- [EMNLP 2024] CodeJudge: Evaluating Code Generation with Large Language Models☆53Nov 13, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆13Jun 11, 2024Updated last year
- [EMNLP 2025 Findings] Familiarity-aware Evidence Compression for Retrieval Augmented Generation☆15Aug 20, 2025Updated 7 months ago
- This is the repository for the resources in CoNLL 2020 Paper "What Are You Trying Todo? Semantic Typing of Event Processes"☆10Jan 5, 2021Updated 5 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆75Jul 25, 2024Updated last year
- This is the repository for the resources in TACL 2022 Paper "Ultra-fine Entity Typing with Indirect Supervision from Natural Language Inf…☆14Aug 17, 2022Updated 3 years ago
- ☆32Sep 11, 2025Updated 6 months ago
- AI-assisted verification of Dafny Programs☆20Nov 9, 2025Updated 5 months ago
- types for various combinatory systems, especialy tree calculi☆24Jan 23, 2025Updated last year
- Artefacts for evaluating user-intent-formalization (translating natural language intent to formal specifications) in different languages☆19Mar 18, 2026Updated 3 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Code for paper "Unraveling Cross-Modality Knowledge Conflicts in Large Vision-Language Models."☆53Oct 19, 2024Updated last year
- Hanoi tower in Coq☆26Jan 29, 2026Updated 2 months ago
- ☆37Nov 13, 2025Updated 4 months ago
- Multi-hop Evidence Retrieval for Cross-document Relation Extraction☆12Sep 1, 2023Updated 2 years ago
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- ☆12May 27, 2022Updated 3 years ago
- Synthesis API Refactor☆12May 17, 2022Updated 3 years ago