wangren09 / TrojanNetDetectorLinks
Practical Detection of Trojan Neural Networks
☆120Updated 4 years ago
Alternatives and similar repositories for TrojanNetDetector
Users that are interested in TrojanNetDetector are comparing it to the libraries listed below
Sorting:
- CVPR 2022 Workshop Robust Classification☆78Updated 3 years ago
- [ICML22] "Revisiting and Advancing Fast Adversarial Training through the Lens of Bi-level Optimization" by Yihua Zhang*, Guanhua Zhang*, …☆65Updated 2 years ago
- ☆58Updated 2 years ago
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆35Updated last year
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆50Updated 4 years ago
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆41Updated last year
- ☆80Updated 3 months ago
- [NDSS'24] Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time☆57Updated 11 months ago
- ☆29Updated 6 months ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack(TPAMI 2025)☆37Updated 3 weeks ago
- A framework for implementing federated learning☆31Updated 4 years ago
- ACL 2025 (Main) HiddenDetect: Detecting Jailbreak Attacks against Multimodal Large Language Models via Monitoring Hidden States☆139Updated 3 months ago
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆136Updated 2 months ago
- [ICLR 2023] Official Tensorflow implementation of "Distributionally Robust Post-hoc Classifiers under Prior Shifts"☆33Updated last year
- To provide the stego community with C/C++ implementations of selected feature extractors mainly targeted at H.264 steganography.☆72Updated 4 years ago
- ☆96Updated 4 years ago
- PhishIntention: Phishing detection through webpage intention☆248Updated 3 weeks ago
- [NeurIPS 2024] GuardT2I: Defending Text-to-Image Models from Adversarial Prompts☆53Updated 3 months ago
- The official code repo for "Safe Delta: Consistently Preserving Safety when Fine-Tuning LLMs on Diverse Datasets" in ICML 2025.☆52Updated 2 months ago
- Secure Transformer Inference is a protocol for serving Transformer-based models securely.☆95Updated last year
- 🔥[MobiCom'25 Poster] AFL-Lib: An Asynchronous Federated Learning Library and Benchmark☆22Updated 2 months ago
- [ICLR2021] Official Pytorch implementation of "When Optimizing f-Divergence is Robust with Label noise"☆67Updated 2 years ago
- [NeurIPS22] "Advancing Model Pruning via Bi-level Optimization" by Yihua Zhang*, Yuguang Yao*, Parikshit Ram, Pu Zhao, Tianlong Chen, Min…☆117Updated 2 years ago
- ☆63Updated 3 weeks ago
- [ICLR 2025] Official implementation of paper "Improving Data Efficiency via Curating LLM-Driven Rating Systems"☆96Updated 5 months ago
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆32Updated last year
- Logogram-enhanced Text Classification Framework☆78Updated 5 years ago
- Fork from Apache Superset v0.99☆32Updated 3 years ago
- [USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malici…☆63Updated 11 months ago
- ☆82Updated 7 years ago