ssloxford / biometric-backdoors
Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"
☆12Updated 3 years ago
Alternatives and similar repositories for biometric-backdoors:
Users that are interested in biometric-backdoors are comparing it to the libraries listed below
- Source code for paper "Breaking Security-Critical Voice Authentication".☆10Updated last year
- Devil-Whisper-Attack☆32Updated 4 years ago
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆35Updated 4 years ago
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆11Updated last year
- Targeted Adversarial Examples for Black Box Audio Systems☆69Updated 4 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆26Updated last year
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆27Updated 5 years ago
- ☆84Updated last year
- Trojan Attack on Neural Network☆183Updated 2 years ago
- ☆51Updated 2 years ago
- StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023☆19Updated 2 years ago
- Public Code for ICS Evasion Attack Generation☆42Updated 3 years ago
- ☆36Updated 5 years ago
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆33Updated 2 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆25Updated last year
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆27Updated 3 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆290Updated 6 months ago
- ☆12Updated last year
- Robust Audio Adversarial Example for a Physical Attack☆62Updated 5 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆40Updated last year
- USB testing framework☆15Updated last year
- Fooling neural based speech recognition systems.☆14Updated 7 years ago
- KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems☆15Updated last year
- ☆85Updated 3 years ago
- ☆24Updated 3 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆104Updated 2 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 3 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆37Updated 3 months ago
- ☆10Updated 3 years ago
- ☆10Updated 2 years ago