[ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (https://proceedings.mlr.press/v202/dai23a)"
☆43Sep 9, 2025Updated 8 months ago
Alternatives and similar repositories for Chameleon-durable-backdoor
Users that are interested in Chameleon-durable-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆47Sep 10, 2025Updated 8 months ago
- ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341☆84Apr 1, 2023Updated 3 years ago
- ☆18Jun 10, 2024Updated last year
- ☆54Jun 30, 2023Updated 2 years ago
- IBA: Towards Irreversible Backdoor Attacks in Federated Learning (Poster at NeurIPS 2023)☆41Sep 10, 2025Updated 8 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆13May 17, 2024Updated last year
- FLTracer: Accurate Poisoning Attack Provenance in Federated Learning☆24Jun 14, 2024Updated last year
- This repo includes all of the solutions to the Algorithmic Toolbox course from Coursera☆10Oct 10, 2022Updated 3 years ago
- ☆19Dec 7, 2020Updated 5 years ago
- This is my project to solve the Lunar Lander environment using the Deep Q-Learning Algorithm with Experience Replay☆12Jan 3, 2023Updated 3 years ago
- Backdoor detection in Federated learning with similarity measurement☆26Apr 30, 2022Updated 4 years ago
- Official Repository for ResSFL (accepted by CVPR '22)☆26Jun 24, 2022Updated 3 years ago
- Source code for paper "How to Backdoor Federated Learning" (https://arxiv.org/abs/1807.00459)☆316Jul 25, 2024Updated last year
- ☆69Feb 17, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆12Jan 28, 2023Updated 3 years ago
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆16May 12, 2024Updated last year
- ☆38Feb 7, 2024Updated 2 years ago
- ☆72Jun 7, 2022Updated 3 years ago
- The core code for our paper "Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning".☆23Dec 25, 2023Updated 2 years ago
- ☆15Dec 7, 2023Updated 2 years ago
- The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".☆38Oct 3, 2022Updated 3 years ago
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆41Apr 3, 2023Updated 3 years ago
- ☆19Nov 17, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Fast integration of backdoor attacks in federated learning with updated attacks and defenses.☆65Jan 19, 2026Updated 3 months ago
- ☆38Oct 17, 2024Updated last year
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆13Jun 20, 2023Updated 2 years ago
- Multi-metrics adaptively identifies backdoors in Federated learning☆37Aug 7, 2025Updated 9 months ago
- This is the code for our paper `Robust Federated Learning with Attack-Adaptive Aggregation' accepted by FTL-IJCAI'21.☆46Jun 12, 2023Updated 2 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆20Nov 7, 2020Updated 5 years ago
- [ICLR 2025] Official implementation for "Bad-PFL: EXPLORING BACKDOOR ATTACKS AGAINST PERSONALIZED FEDERATED LEARNING"☆15Feb 14, 2025Updated last year
- The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recogn…☆126May 9, 2023Updated 3 years ago
- ☆25Jul 12, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code for Backdoor Attacks Against Dataset Distillation☆36Apr 19, 2023Updated 3 years ago
- Code for Data Poisoning Attacks Against Federated Learning Systems☆205Jun 13, 2021Updated 4 years ago
- Code for USENIX Security 2023 Paper "Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks"☆19May 19, 2024Updated last year
- A list of backdoor learning resources☆1,166Jul 31, 2024Updated last year
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- ⚔️ Blades: A Unified Benchmark Suite for Attacks and Defenses in Federated Learning☆155Feb 16, 2025Updated last year
- SampDetox: Black-box Backdoor Defense via Perturbation-based Sample Detoxification☆15Jun 10, 2025Updated 11 months ago