The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
☆16May 12, 2024Updated last year
Alternatives and similar repositories for MM-BD
Users that are interested in MM-BD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A data-free backdoor detector for deep neural networks☆21Mar 8, 2023Updated 3 years ago
- 这个仓库用来存储潦草学者文章的附录文件,欢迎下载使用。☆27Jan 13, 2026Updated 2 months ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- A Backdoor Attack against 3D Point Cloud Classifiers (ICCV2021)☆18Oct 20, 2021Updated 4 years ago
- OpenCompass is an LLM evaluation platform, supporting a wide range of models (Llama3, Mistral, InternLM2,GPT-4,LLaMa2, Qwen,GLM, Claude, …☆19Jun 25, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆16Oct 12, 2023Updated 2 years ago
- Codes for Dual Stealthy Backdoor☆14Feb 10, 2024Updated 2 years ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆43Sep 9, 2025Updated 6 months ago
- Source code for the GeoDMS software☆14Updated this week
- Code associated with ICML (2024). "Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normaliz…☆10Feb 22, 2026Updated last month
- Code for the paper: Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions☆11Mar 13, 2024Updated 2 years ago
- Official implementation for ICLR 2025 paper "Distilling Reinforcement Learning Algorithms for In-Context Model-Based Planning"☆20Mar 5, 2025Updated last year
- ☆13Apr 1, 2022Updated 3 years ago
- Two-party Privacy-preserving Neural Network Training using Split Learning and Homomorphic Encryption (CKKS Scheme)☆11Sep 23, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- [NeurIPS'24] Official implement of "PrivCirNet: Efficient Private Inference via Block Circulant Transformation"☆15Feb 26, 2026Updated last month
- This repository provides code for the paper ---- On Universal Black-Box Domain Adaptation.☆10Sep 2, 2021Updated 4 years ago
- ☆16Oct 1, 2025Updated 5 months ago
- The official implementation of CVPR 2025 paper "Invisible Backdoor Attack against Self-supervised Learning"☆17Jul 5, 2025Updated 8 months ago
- Beyond Myopia: Learning from Positive and Unlabeled Data through Holistic Predictive Trends [NeurIPS 2023]☆10Jan 28, 2024Updated 2 years ago
- anonymous github for SGSR: Beyond Social Homophily: Score-based Generative Diffusion Models for Social Recommendations☆12Sep 18, 2025Updated 6 months ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Jan 9, 2025Updated last year
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆17Sep 25, 2024Updated last year
- The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recogn…☆125May 9, 2023Updated 2 years ago
- ☆14May 23, 2023Updated 2 years ago
- BackTime: Backdoor Attacks on Multivariate Time Series Forecasting☆31Apr 14, 2025Updated 11 months ago
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- A Semi-supervised learning model (Ladder Network) to classify MNIST digits. A few attacks were executed on it with the target of misclass…☆10Mar 30, 2023Updated 2 years ago
- ☆19Mar 26, 2022Updated 4 years ago
- ☆16Feb 3, 2022Updated 4 years ago
- Codes of A Concise yet Effective model for Non-Aligned Incomplete Multi-view and Missing Multi-label Learning (TPAMI 2022)☆14May 16, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆20May 5, 2024Updated last year
- BackdoorMBTI is an open source project expanding the unimodal backdoor learning to a multimodal context. We hope that BackdoorMBTI can fa…☆25Mar 18, 2026Updated last week
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆23Dec 6, 2023Updated 2 years ago
- ☆18Aug 15, 2022Updated 3 years ago
- An official PyTorch implementation of "Unnoticeable Backdoor Attacks on Graph Neural Networks" (WWW 2023)☆61Dec 3, 2023Updated 2 years ago
- Source code of FedAttack.☆11Feb 9, 2022Updated 4 years ago
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago