robbycostales / live-trojansView external linksLinks
Code for "Live Trojan Attacks on Deep Neural Networks" paper
☆10May 8, 2020Updated 5 years ago
Alternatives and similar repositories for live-trojans
Users that are interested in live-trojans are comparing it to the libraries listed below
Sorting:
- ☆11Mar 24, 2023Updated 2 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Detect adversarial images from intermediate features in distance space☆12Aug 22, 2018Updated 7 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 8 years ago
- ☆14Mar 16, 2020Updated 5 years ago
- Bibliography of stuff I've been reading☆13Nov 1, 2020Updated 5 years ago
- ☆12Feb 1, 2020Updated 6 years ago
- Contains implementation of denoising algorithms.☆11Jul 16, 2020Updated 5 years ago
- Adversarial detection and defense for deep learning systems using robust feature alignment☆18Nov 10, 2020Updated 5 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- Code and experiments for the adversarial detection paper☆21Jun 11, 2021Updated 4 years ago
- Exploring the network released by the ICIJ from the Panama Papers☆21Jan 22, 2018Updated 8 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Oct 25, 2019Updated 6 years ago
- DevSecOps command line asset inventory tool☆30Oct 2, 2023Updated 2 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆314Feb 28, 2020Updated 5 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 4 years ago
- ☆24Apr 14, 2019Updated 6 years ago
- https://www.kaggle.com/c/microsoft-malware-prediction/leaderboard☆22Mar 14, 2019Updated 6 years ago
- Notes about books I've read☆30Jan 23, 2024Updated 2 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Decipher all things Philly☆24Jan 11, 2023Updated 3 years ago
- Overview of different schools of systems thinking☆37Jul 6, 2025Updated 7 months ago
- CYBAR OSINT CTF 2020☆23Jun 10, 2020Updated 5 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆61Nov 12, 2024Updated last year
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Oct 15, 2017Updated 8 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆34Dec 16, 2019Updated 6 years ago
- Trojan Attack on Neural Network☆191Mar 25, 2022Updated 3 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆37Oct 2, 2020Updated 5 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆14Dec 19, 2025Updated last month
- ☆10Sep 12, 2019Updated 6 years ago
- 深度学习☆10Jun 9, 2017Updated 8 years ago
- ROBOTIS-OP series datas☆10Jan 2, 2020Updated 6 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- ☆12Dec 22, 2025Updated last month
- Tool for testing IPv4 and IPv6 DHCP services☆13Mar 27, 2020Updated 5 years ago
- A simple implementation of BadNets on MNIST☆33Jul 29, 2019Updated 6 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- PyTorch implementation of "Feature Denoising for Improving Adversarial Robustness" on CIFAR10.☆34Apr 1, 2020Updated 5 years ago