Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.
☆13Aug 25, 2021Updated 4 years ago
Alternatives and similar repositories for backdoor_attack
Users that are interested in backdoor_attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Feb 5, 2021Updated 5 years ago
- A Visual Question Answering model implemented in MindSpore and PyTorch. The model is a reimplementation of the paper *Show, Ask, Attend, …☆10Jul 27, 2021Updated 4 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆27Jul 3, 2025Updated 8 months ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- Pytorch implementation of the paper "Debiased Explainable Pairwise Ranking from Implicit Feedback".☆12May 26, 2022Updated 3 years ago
- This repo aims at providing a simple paper reading roadmap for beginners on some research topics in software engineering.☆19Oct 14, 2021Updated 4 years ago
- ☆13Oct 21, 2021Updated 4 years ago
- An algorithm based on Java implementation, can automatically check the set of outliers in a set of data, eliminate these outliers, and fi…☆12May 11, 2021Updated 4 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆62May 8, 2023Updated 2 years ago
- bayesgm: An AI-powered versatile Bayesian Generative Modeling Framework☆55Updated this week
- ☆19Mar 26, 2022Updated 3 years ago
- Simple pytorch classification baselines for MNIST, CIFAR and ImageNet☆19Aug 7, 2019Updated 6 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆22Jul 12, 2021Updated 4 years ago
- ☆13Jun 4, 2025Updated 9 months ago
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- LeNet, AleNet, VGGNet, GoogleNet, ResNet are used for MNIST dataset based on keras.☆15Dec 11, 2018Updated 7 years ago
- [ICLR 2025] On Evluating the Durability of Safegurads for Open-Weight LLMs☆13Jun 20, 2025Updated 9 months ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL im…☆10Aug 22, 2019Updated 6 years ago
- basic algorithms of Computer Science☆11Apr 24, 2016Updated 9 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- Code for our paper "Localizing Lying in Llama"☆13Apr 24, 2025Updated 10 months ago
- LISA Traffic Signs Dataset for Pytorch. For Classification. 32x32 images. I use this to reproduce the Activation Clustering Results.☆20Jan 12, 2021Updated 5 years ago
- The codebase for the paper "A Tail-Index Analysis of Stochastic Gradient Noise in Deep Neural Networks"☆28Sep 26, 2019Updated 6 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago
- A simple implementation of IRIS dataset classification with Pytorch☆19Mar 18, 2018Updated 8 years ago
- Course Companion☆12Nov 20, 2016Updated 9 years ago
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆12Jun 12, 2023Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- Completely remove Gemini’s SynthID security so it can’t detect that your image was made with AI. Simply clone the repository locally, run…☆31Dec 10, 2025Updated 3 months ago
- 基于LSB隐写术将文本隐藏于320x240的灰度图像☆21Nov 23, 2019Updated 6 years ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Aug 24, 2020Updated 5 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆106Aug 2, 2022Updated 3 years ago
- ☆83Aug 3, 2021Updated 4 years ago
- Classify traffic signs by three classic ConvNets architecture using GTSRB dataset.☆24May 6, 2018Updated 7 years ago
- Python logging JSON Formatter☆16Jan 13, 2026Updated 2 months ago