zce / quickapp-locally
一个快应用的示例项目
☆13Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for quickapp-locally
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆54Updated 5 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆116Updated last year
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆30Updated 3 years ago
- 图像分类模型的对抗攻击和对抗训练(使用Fashion MNIST数据集)☆8Updated 4 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆12Updated 3 years ago
- ☆24Updated 3 years ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Updated 4 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆16Updated 2 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆75Updated last year
- ☆41Updated last year
- Implementation of badnets on CIFAR10 and MNIST☆9Updated 3 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆68Updated 8 months ago
- Camouflage poisoning via machine unlearning☆15Updated last year
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆176Updated 7 months ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆24Updated 3 years ago
- Membership Inference Attack against Graph Neural Networks☆12Updated 2 years ago
- ☆24Updated last year
- ☆10Updated last year
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆9Updated 2 years ago
- A simple implementation of BadNets on MNIST☆32Updated 5 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆31Updated last year
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆24Updated last year
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆46Updated 2 years ago
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆13Updated 6 months ago
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆150Updated 4 months ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆111Updated this week
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆28Updated 4 months ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆40Updated last year
- ☆30Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆49Updated this week