usnistgov / trojai-exampleLinks
Example TrojAI Submission
☆25Updated 6 months ago
Alternatives and similar repositories for trojai-example
Users that are interested in trojai-example are comparing it to the libraries listed below
Sorting:
- ☆66Updated 4 years ago
- ☆23Updated 2 years ago
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆57Updated 7 months ago
- ☆146Updated 8 months ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆52Updated 3 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 3 years ago
- ☆21Updated 4 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Updated 7 months ago
- Code for NDSS 2022 paper "MIRROR: Model Inversion for Deep Learning Network with High Fidelity"☆25Updated 2 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆29Updated 6 months ago
- ☆16Updated 2 years ago
- ☆48Updated 4 years ago
- Code for "Adversarial Illusions in Multi-Modal Embeddings"☆24Updated 11 months ago
- A toolbox for backdoor attacks.☆22Updated 2 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆77Updated 2 years ago
- ☆27Updated 2 years ago
- ☆24Updated 2 years ago
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Updated 3 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated this week
- Craft poisoned data using MetaPoison☆51Updated 4 years ago
- ☆24Updated 3 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆43Updated last year
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Updated 4 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆29Updated 3 years ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆57Updated last year
- ☆18Updated 4 years ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆19Updated 2 years ago
- ☆44Updated 2 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆20Updated 2 years ago