xandery-geek / BackdoorAttacksView external linksLinks
A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...
☆22Dec 7, 2024Updated last year
Alternatives and similar repositories for BackdoorAttacks
Users that are interested in BackdoorAttacks are comparing it to the libraries listed below
Sorting:
- ☆20Aug 7, 2023Updated 2 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Apr 5, 2022Updated 3 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Apr 1, 2021Updated 4 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- Code for paper 'FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis'☆37Sep 12, 2022Updated 3 years ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆236Mar 15, 2024Updated last year
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆48Apr 27, 2022Updated 3 years ago
- 校园音乐征集投票系统 A system for electing annual school music☆10Feb 2, 2026Updated 2 weeks ago
- ☆16Jun 14, 2024Updated last year
- [CVPR 2023] "TrojViT: Trojan Insertion in Vision Transformers" by Mengxin Zheng, Qian Lou, Lei Jiang☆14Jan 5, 2024Updated 2 years ago
- 同济大学计科机器学习大作业☆10Mar 22, 2025Updated 10 months ago
- [KDD'25] HiBench: Benchmarking LLMs Capability on Hierarchical Structure Reasoning☆15Sep 17, 2025Updated 5 months ago
- The aim of this Github repository is to collect and summarise research works on backdoor attacks and defences on deep learning models.☆13Sep 7, 2022Updated 3 years ago
- ☆18Apr 10, 2025Updated 10 months ago
- Backdoor Cleansing with Unlabeled Data (CVPR 2023)☆12Apr 6, 2023Updated 2 years ago
- 2024-2025下半学年人工智能导论(拔尖班)☆17Jun 16, 2025Updated 8 months ago
- ☆12May 27, 2022Updated 3 years ago
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated last month
- 基于 BPE 实现的中文分词。优化:预处理,并行计算,多字词,多词表☆14May 14, 2022Updated 3 years ago
- 量化交易网站,软工三大作业迭代三,团队项目☆11Mar 8, 2018Updated 7 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆105Aug 2, 2022Updated 3 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- ☆54Jun 30, 2023Updated 2 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆43Sep 11, 2022Updated 3 years ago
- ☆13Jun 1, 2024Updated last year
- 这是一个可通过网页远程登录管理、可接入讯飞星火、ChatGPT等大语言模型的微信聊天机器人,使用微信网页版协议。☆16Feb 20, 2024Updated last year
- FedBERT : A federated approach that enables clients with limited computing resource to participate without violating data privacy.☆14Jul 3, 2023Updated 2 years ago
- A deep neural net approach to nanostructure analysis in scanning electron microscope (SEM) images.☆12Jun 30, 2020Updated 5 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Nov 16, 2022Updated 3 years ago
- The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recogn…☆123May 9, 2023Updated 2 years ago
- 这是一个大学生互联网+的大创项目:“一点到家”——云滇家政平台助力乡村振兴,系统前台:微信小程序,后端springboot,数据库mysql。属于一个非常值得推荐的项目,系统源码简单宜读,干净简洁、注释详细,可二次开发。创意满满,贴近生活,缓解就业压力,为农民增收致富,促进…☆14Jun 17, 2023Updated 2 years ago
- Paper: "Aggregating Capacity in FL through Successive Layer Training for Computationally-Constrained Devices"☆18Jan 10, 2024Updated 2 years ago
- ☆20Feb 4, 2026Updated last week
- PyTorch implementation of Stereopagnosia: Fooling Stereo Networks with Adversarial Perturbations (in AAAI 2021)☆13Mar 20, 2022Updated 3 years ago
- [ECCV'24] T2IShield: Defending Against Backdoors on Text-to-Image Diffusion Models☆17Dec 21, 2025Updated last month
- ☆13May 1, 2024Updated last year
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Feb 5, 2021Updated 5 years ago
- 大学整理项目一:一个旅游踩点项目,踩点即对一个个事先有记录的有意思的旅行停驻点进行拜访游玩并留下你的足,这些停驻点我们称之为关注点。在该系统中还可以自己规划行程,事先计划好要前往的关注点 ,路线然后按照系统上的路线规划进行旅游,在旅游中可以写一些文字,发一些图片,整个行程完…☆10Apr 27, 2018Updated 7 years ago