wangren09 / TrojanNetDetector
Practical Detection of Trojan Neural Networks
☆119Updated 4 years ago
Alternatives and similar repositories for TrojanNetDetector:
Users that are interested in TrojanNetDetector are comparing it to the libraries listed below
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆32Updated 9 months ago
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆32Updated 8 months ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆48Updated 3 years ago
- ☆58Updated last year
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆91Updated 4 months ago
- [ICML22] "Revisiting and Advancing Fast Adversarial Training through the Lens of Bi-level Optimization" by Yihua Zhang*, Guanhua Zhang*, …☆65Updated 2 years ago
- A framework for implementing federated learning☆32Updated 3 years ago
- CVPR 2022 Workshop Robust Classification☆78Updated 2 years ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack☆23Updated 3 months ago
- ☆73Updated 3 months ago
- Improved techniques for optimization-based jailbreaking on large language models (ICLR2025)☆73Updated 2 weeks ago
- [ICLR 2023] Official Tensorflow implementation of "Distributionally Robust Post-hoc Classifiers under Prior Shifts"☆34Updated last year
- [USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malici…☆58Updated 4 months ago
- Secure Transformer Inference is a protocol for serving Transformer-based models securely.☆90Updated 9 months ago
- A comprehensive collection of resources focused on addressing and understanding hallucination phenomena in MLLMs.☆35Updated 9 months ago
- Deep Learning - Robustness - Immune System☆14Updated 3 years ago
- [ICLR2021] Official Pytorch implementation of "When Optimizing f-Divergence is Robust with Label noise"☆67Updated 2 years ago
- ☆35Updated last month
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆70Updated last year
- [NDSS'24] Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time☆26Updated 4 months ago
- HeFlwr: Federated Learning for Heterogeneous Devices☆94Updated 2 months ago
- Our code for paper 'The art of defense: letting networks fool the attacker', IEEE Transactions on Information Forensics and Security, 202…☆10Updated last year
- [NeurIPS22] "Advancing Model Pruning via Bi-level Optimization" by Yihua Zhang*, Yuguang Yao*, Parikshit Ram, Pu Zhao, Tianlong Chen, Min…☆116Updated last year
- [CVPR2024] MMA-Diffusion: MultiModal Attack on Diffusion Models☆142Updated 10 months ago
- ☆17Updated 3 months ago
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆26Updated 7 months ago
- ☆53Updated last month
- ☆17Updated last year
- PhishIntention: Phishing detection through webpage intention☆247Updated last month
- use sklearn to detect two types of network attacks☆28Updated 5 years ago