xuxiong0214 / BTIDBFView external linksLinks
☆17Feb 25, 2024Updated last year
Alternatives and similar repositories for BTIDBF
Users that are interested in BTIDBF are comparing it to the libraries listed below
Sorting:
- ☆19Jun 21, 2021Updated 4 years ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- [ICLR 2025] REFINE: Inversion-Free Backdoor Defense via Model Reprogramming☆12Feb 13, 2025Updated last year
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- ☆27Nov 9, 2022Updated 3 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆36Oct 29, 2025Updated 3 months ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- anonymous github for SGSR: Beyond Social Homophily: Score-based Generative Diffusion Models for Social Recommendations☆12Sep 18, 2025Updated 4 months ago
- [RecSys 2021] PyTorch Implementation of Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction☆40Sep 6, 2021Updated 4 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 4 years ago
- ☆12Nov 2, 2024Updated last year
- Official Implementation for "Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approxim…☆12Aug 14, 2024Updated last year
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- ☆10Oct 13, 2022Updated 3 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- A pytorch implementation of the AAAI2021 paper GraCapsNet: Interpretable Graph Capsule Networks for Object Recognition☆10Oct 2, 2022Updated 3 years ago
- ICCV'23 | Adverse Weather Removal with Codebook Priors☆10Aug 28, 2023Updated 2 years ago
- ☆14Feb 26, 2025Updated 11 months ago
- A compact toolbox for backdoor attacks and defenses.☆191Jul 16, 2024Updated last year
- ☆581Jul 4, 2025Updated 7 months ago
- ☆47Mar 29, 2022Updated 3 years ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆49Apr 8, 2024Updated last year
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- 无线感知相关论文☆11Oct 26, 2021Updated 4 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- a distributed read-only cache, based groupcache, using etcd as a registry, supports efficient concurrent reading.☆14Sep 25, 2023Updated 2 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- ☆12May 27, 2022Updated 3 years ago
- Source code of FedAttack.☆11Feb 9, 2022Updated 4 years ago
- ☆17Jun 18, 2025Updated 7 months ago
- ☆15Apr 7, 2023Updated 2 years ago
- ☆14Jan 4, 2025Updated last year
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated last year
- ☆12Dec 9, 2020Updated 5 years ago