A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...
☆22Dec 7, 2024Updated last year
Alternatives and similar repositories for BackdoorAttacks
Users that are interested in BackdoorAttacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆27Jul 3, 2025Updated 8 months ago
- The open-sourced Python toolbox for backdoor attacks and defenses.☆651Sep 27, 2025Updated 6 months ago
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆48Apr 27, 2022Updated 3 years ago
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆237Mar 15, 2024Updated 2 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆139Nov 11, 2024Updated last year
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Apr 1, 2021Updated 4 years ago
- Benchmarking various Computer Vision models on TinyImageNet Dataset☆34Mar 24, 2023Updated 3 years ago
- ☆16Jun 14, 2024Updated last year
- [CVPR 2023] "TrojViT: Trojan Insertion in Vision Transformers" by Mengxin Zheng, Qian Lou, Lei Jiang☆14Jan 5, 2024Updated 2 years ago
- ☆13May 1, 2024Updated last year
- Backdoor Cleansing with Unlabeled Data (CVPR 2023)☆12Apr 6, 2023Updated 2 years ago
- The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recogn…☆125May 9, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PyTorch implementation of the video anomaly detection paper☆11Feb 24, 2021Updated 5 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- Pytorch implementation of backdoor unlearning.☆21Jun 8, 2022Updated 3 years ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆21Aug 15, 2022Updated 3 years ago
- ☆13Jun 1, 2024Updated last year
- Custom built ConvLSTM cell in Tensorflow and PyTorch☆15Aug 2, 2018Updated 7 years ago
- Caffe(v1)-compatible codebase to generate optical flow training data on-the-fly; used for the IJCV 2018 paper "What Makes Good Synthetic …☆18Oct 22, 2019Updated 6 years ago
- FedBERT : A federated approach that enables clients with limited computing resource to participate without violating data privacy.☆14Jul 3, 2023Updated 2 years ago
- ☆18Apr 10, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆54Jun 30, 2023Updated 2 years ago
- A deep neural net approach to nanostructure analysis in scanning electron microscope (SEM) images.☆12Jun 30, 2020Updated 5 years ago
- ☆14Jul 24, 2018Updated 7 years ago
- ☆23Dec 14, 2023Updated 2 years ago
- ☆17Feb 6, 2025Updated last year
- 校园音乐征集投票系统 A system for electing annual school music☆10Mar 13, 2026Updated 2 weeks ago
- ☆592Jul 4, 2025Updated 8 months ago
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆16Oct 24, 2024Updated last year
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆303Aug 25, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A compact toolbox for backdoor attacks and defenses.☆191Jul 16, 2024Updated last year
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification☆16Oct 31, 2023Updated 2 years ago
- 量化交易网站,软工三大作业迭代三,团队项目☆11Mar 8, 2018Updated 8 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆132Oct 24, 2023Updated 2 years ago
- A list of backdoor learning resources☆1,163Jul 31, 2024Updated last year
- ☆26Dec 1, 2022Updated 3 years ago
- BUAA CST Spring 2019 Cryptography Experiment☆11Nov 23, 2019Updated 6 years ago