[NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification
☆17Oct 31, 2023Updated 2 years ago
Alternatives and similar repositories for ZIP
Users that are interested in ZIP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Codes for Dual Stealthy Backdoor☆14Feb 10, 2024Updated 2 years ago
- ☆13Jun 1, 2024Updated last year
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated 2 years ago
- Official implementation of "Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection" (ICLR 2024)☆18Apr 15, 2024Updated 2 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆36Jan 9, 2023Updated 3 years ago
- ☆15Apr 7, 2023Updated 3 years ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆50Apr 8, 2024Updated 2 years ago
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- Official Code for reproductivity of the NeurIPS 2023 paper: Adversarial Examples Are Not Real Features☆16Jun 27, 2024Updated last year
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆17Sep 1, 2023Updated 2 years ago
- ☆13May 1, 2024Updated 2 years ago
- Adversarial learning by utilizing model interpretation☆10Oct 19, 2018Updated 7 years ago
- code of paper "IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Gene…☆35May 23, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Nov 16, 2022Updated 3 years ago
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Oct 1, 2022Updated 3 years ago
- ☆28Feb 1, 2023Updated 3 years ago
- ☆16Jun 14, 2024Updated last year
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆20Apr 27, 2023Updated 3 years ago
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- Benchmarking Multi-Image Understanding in Vision and Language Models☆11Jul 29, 2024Updated last year
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Sensor data science and AI tutorial☆12Feb 15, 2026Updated 3 months ago
- A comparison of human attention with computational attention mechanisms☆12Jul 3, 2020Updated 5 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- ☆15Dec 12, 2022Updated 3 years ago
- BeeDrive: Open Source Privacy File Transfering System for Teams and Individual Developers☆12Mar 12, 2024Updated 2 years ago
- TODO ;)☆12Aug 13, 2018Updated 7 years ago
- ☆64Aug 9, 2023Updated 2 years ago
- [TACL/EMNLP'24] Do Vision and Language Models Share Concepts? A Vector Space Alignment Study☆16Nov 22, 2024Updated last year
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Apr 5, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PyTorch code for WWW 19 paper: On Attribution of Recurrent Neural Network Predictions via Additive Decomposition☆11Mar 18, 2021Updated 5 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆139Nov 11, 2024Updated last year
- ☆14Jun 21, 2019Updated 6 years ago
- [CIKM2023] GiGaMA: Generalizable Graph Masked Autoencoder via Collaborative Latent Space Reconstruction☆18Aug 31, 2023Updated 2 years ago
- ☆16Oct 23, 2019Updated 6 years ago
- This is the official implementation of ICLR 2024 paper "VDC: Versatile Data Cleanser based on Visual-Linguistic Inconsistency by Multimod…☆19Feb 24, 2025Updated last year
- ☆15Jul 5, 2024Updated last year