[S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models
☆19Feb 18, 2025Updated last year
Alternatives and similar repositories for TePA
Users that are interested in TePA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆18Jul 12, 2022Updated 3 years ago
- ☆31Feb 10, 2022Updated 4 years ago
- ☆14Feb 26, 2025Updated last year
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- [TPAMI 2024] The official implementation of "Revisiting Realistic Test-Time Training: Sequential Inference and Adaptation by Anchored Clu…☆12Mar 19, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆16Oct 14, 2024Updated last year
- ☆30Jan 17, 2024Updated 2 years ago
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated 2 years ago
- ☆27Nov 20, 2023Updated 2 years ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated 2 years ago
- ☆14Jun 6, 2023Updated 2 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- [IGARSS 2024] Code for "CLIP-Guided Source-Free Object Detection in Aerial Images"☆28Dec 2, 2024Updated last year
- [AAAI 2024] Towards Real-World Test-Time Adaptation: Tri-Net Self-Training with Balanced Normalization☆29Apr 8, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆12May 6, 2022Updated 4 years ago
- Ungrafting Malicious Code from Piggybacked Android Apps☆14Sep 27, 2016Updated 9 years ago
- [NDSS'25] The official implementation of safety misalignment.☆19Jan 8, 2025Updated last year
- ☆13Oct 21, 2021Updated 4 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆46Nov 5, 2024Updated last year
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆141Sep 11, 2025Updated 7 months ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- ☆22Jan 6, 2025Updated last year
- ☆13May 1, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for Backdoor Attacks Against Dataset Distillation☆36Apr 19, 2023Updated 3 years ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆343Nov 11, 2025Updated 5 months ago
- ☆33Aug 28, 2024Updated last year
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- CodeMind is a generic framework for evaluating inductive code reasoning of LLMs. It is equipped with a static analysis component that ena…☆42Feb 18, 2026Updated 2 months ago
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year
- Seminar 2022☆25Mar 19, 2026Updated last month
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- Code for the CVPR '23 paper, "Defending Against Patch-based Backdoor Attacks on Self-Supervised Learning"☆10Jun 9, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is a python script to generate nice bibtex file for latex.☆19Mar 1, 2020Updated 6 years ago
- [ICLR 2024] "Data Distillation Can Be Like Vodka: Distilling More Times For Better Quality" by Xuxi Chen*, Yu Yang*, Zhangyang Wang, Baha…☆15May 18, 2024Updated last year
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- FLPoison: Benchmarking Poisoning Attacks and Defenses in Federated Learning☆58Apr 15, 2026Updated 3 weeks ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 4 years ago
- [ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining☆19Feb 26, 2025Updated last year
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 3 years ago