☆19Jun 27, 2021Updated 4 years ago
Alternatives and similar repositories for ModelDiff
Users that are interested in ModelDiff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- ☆18Oct 7, 2022Updated 3 years ago
- Code release for DeepJudge (S&P'22)☆52Mar 14, 2023Updated 3 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆31Oct 10, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆14Sep 20, 2023Updated 2 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Dec 2, 2020Updated 5 years ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆15Dec 2, 2021Updated 4 years ago
- ☆24Apr 14, 2019Updated 6 years ago
- ☆19Mar 26, 2022Updated 4 years ago
- Implementation of TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems (https://arxiv.org/pdf/190…☆19Apr 13, 2023Updated 2 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- Fuzzing Automatic Differentiation in Deep-Learning Libraries (ICSE'23)☆27Mar 2, 2024Updated 2 years ago
- Code release for RobOT (ICSE'21)☆15Dec 5, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆34Feb 8, 2022Updated 4 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆132Oct 24, 2023Updated 2 years ago
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Oct 1, 2022Updated 3 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆115Dec 8, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆26Jan 11, 2023Updated 3 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- DeepInspect code release☆11Feb 11, 2020Updated 6 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- LLM-guided hyperparameter tuning☆10Oct 7, 2023Updated 2 years ago
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆27Oct 5, 2022Updated 3 years ago
- ☆50Feb 27, 2021Updated 5 years ago
- For our ICSE22 paper "EAGLE: Creating Equivalent Graphs to Test Deep Learning Libraries" by Jiannan Wang, Thibaud Lutellier, Shangshu Qia…☆13Aug 16, 2023Updated 2 years ago
- Code for the paper "Exploring Backdoor Vulnerabilities of Chat Models"☆19Apr 13, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Implementation of "DeepWriter: A Multi-Stream Deep CNN for Text-independent Writer Identification"☆16Feb 3, 2020Updated 6 years ago
- Code for paper "Membership Inference Attacks Against Vision-Language Models"☆28Jan 25, 2025Updated last year
- ☆15Jan 24, 2023Updated 3 years ago
- Official implementation repository for the paper Towards General Conceptual Model Editing via Adversarial Representation Engineering.☆20Dec 6, 2024Updated last year
- ☆11Aug 21, 2017Updated 8 years ago
- codes for ICML2021 paper iDARTS: Differentiable Architecture Search with Stochastic Implicit Gradients☆10May 27, 2021Updated 4 years ago
- ☆41Aug 12, 2024Updated last year