A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...
☆22Dec 7, 2024Updated last year
Alternatives and similar repositories for BackdoorAttacks
Users that are interested in BackdoorAttacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆27Jul 3, 2025Updated 9 months ago
- ☆21Aug 7, 2023Updated 2 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Apr 5, 2022Updated 4 years ago
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for paper 'FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis'☆39Sep 12, 2022Updated 3 years ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆238Mar 15, 2024Updated 2 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆139Nov 11, 2024Updated last year
- Benchmarking various Computer Vision models on TinyImageNet Dataset☆34Mar 24, 2023Updated 3 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Nov 16, 2022Updated 3 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Feb 5, 2021Updated 5 years ago
- ☆16Jun 14, 2024Updated last year
- [CVPR 2023] "TrojViT: Trojan Insertion in Vision Transformers" by Mengxin Zheng, Qian Lou, Lei Jiang☆15Jan 5, 2024Updated 2 years ago
- ☆13May 1, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Backdoor Cleansing with Unlabeled Data (CVPR 2023)☆12Apr 6, 2023Updated 3 years ago
- The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recogn…☆125May 9, 2023Updated 2 years ago
- PyTorch implementation of the video anomaly detection paper☆11Feb 24, 2021Updated 5 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Sep 11, 2022Updated 3 years ago
- Pytorch implementation of backdoor unlearning.☆21Jun 8, 2022Updated 3 years ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆21Aug 15, 2022Updated 3 years ago
- ☆13Jun 1, 2024Updated last year
- FedBERT : A federated approach that enables clients with limited computing resource to participate without violating data privacy.☆14Jul 3, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆54Jun 30, 2023Updated 2 years ago
- A deep neural net approach to nanostructure analysis in scanning electron microscope (SEM) images.☆12Jun 30, 2020Updated 5 years ago
- ☆14Jul 24, 2018Updated 7 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆106Aug 2, 2022Updated 3 years ago
- ☆20Oct 28, 2025Updated 5 months ago
- ☆17Feb 6, 2025Updated last year
- ☆595Jul 4, 2025Updated 9 months ago
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆16Oct 24, 2024Updated last year
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆303Aug 25, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated 4 months ago
- A compact toolbox for backdoor attacks and defenses.☆192Jul 16, 2024Updated last year
- Taurix OS kernel. Taurix 系统内核,操作系统原理实(xjb)践(写)☆12Dec 20, 2020Updated 5 years ago
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification☆16Oct 31, 2023Updated 2 years ago
- An Efficent BPE Algorithm Faster then Hugging Face Tokenizer's Implementation☆13Sep 9, 2024Updated last year
- A list of backdoor learning resources☆1,163Jul 31, 2024Updated last year
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆132Oct 24, 2023Updated 2 years ago