rigley007 / OpenPrivML
☆8Updated 2 months ago
Alternatives and similar repositories for OpenPrivML:
Users that are interested in OpenPrivML are comparing it to the libraries listed below
- ☆11Updated 2 years ago
- ☆11Updated 2 years ago
- ☆11Updated 10 months ago
- ☆19Updated 3 years ago
- Code Implementation For Paper "FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition"☆10Updated 5 months ago
- ☆14Updated 2 years ago
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆14Updated 2 years ago
- ☆17Updated 3 years ago
- ☆19Updated 2 years ago
- ☆13Updated 3 years ago
- ☆11Updated 3 years ago
- Github repo for One-shot Neural Backdoor Erasing via Adversarial Weight Masking (NeurIPS 2022)☆15Updated 2 years ago
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆15Updated last year
- Backdoor Cleansing with Unlabeled Data (CVPR 2023)☆13Updated last year
- ☆17Updated 3 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Updated 2 years ago
- ☆13Updated 11 months ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆22Updated last year
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆13Updated 10 months ago
- ☆21Updated 4 years ago
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification☆11Updated last year
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆17Updated last year
- ☆18Updated 2 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Updated 2 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 3 years ago
- ☆10Updated 2 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 2 years ago
- ☆26Updated 2 years ago
- ☆19Updated 3 years ago
- ☆30Updated 3 years ago