ssloxford / biometric-backdoorsLinks
Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"
☆11Updated 3 years ago
Alternatives and similar repositories for biometric-backdoors
Users that are interested in biometric-backdoors are comparing it to the libraries listed below
Sorting:
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆290Updated 9 months ago
- Trojan Attack on Neural Network☆184Updated 3 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 3 years ago
- Devil-Whisper-Attack☆35Updated 2 months ago
- ☆51Updated 2 years ago
- ☆85Updated last year
- Copycat CNN☆28Updated last year
- Pytorch implementation of Backdoor Attack against Speaker Verification☆25Updated last year
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆216Updated 6 years ago
- USB testing framework☆15Updated 2 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆99Updated 2 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆26Updated 2 years ago
- Public Code for ICS Evasion Attack Generation☆42Updated 4 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆41Updated 6 months ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆27Updated 5 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆23Updated last year
- ☆36Updated 5 years ago
- A curated list of academic events on AI Security & Privacy☆152Updated 9 months ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆288Updated 5 years ago
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆14Updated last year
- A compact toolbox for backdoor attacks and defenses.☆173Updated 10 months ago
- StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023☆20Updated 2 years ago
- Dataset of 475000 faces from 530 faces (50x50 color) from facescrub☆18Updated 5 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆127Updated last year
- An awesome list of papers on privacy attacks against machine learning☆608Updated last year
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆35Updated 10 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Fast integration of backdoor attacks in machine learning and federated learning.☆54Updated last year
- Simple TPM utils in Python for generating random numbers & RSA keys☆19Updated 8 years ago
- ☆107Updated last week