Pytorch implementation of Backdoor Attack against Speaker Verification
☆28Sep 19, 2023Updated 2 years ago
Alternatives and similar repositories for Backdoor-attack-against-speaker-verification
Users that are interested in Backdoor-attack-against-speaker-verification are comparing it to the libraries listed below
Sorting:
- ☆10Oct 13, 2022Updated 3 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- TDY-CNN for text-independent speaker verification☆19Nov 7, 2022Updated 3 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Jun 29, 2021Updated 4 years ago
- Learning Domain-Invariant Transformation for Speaker Verification.☆11Jun 13, 2023Updated 2 years ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆25May 25, 2023Updated 2 years ago
- ☆28Jun 17, 2024Updated last year
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- ☆15Apr 7, 2023Updated 2 years ago
- ☆14Jan 4, 2025Updated last year
- ☆12Oct 19, 2020Updated 5 years ago
- Trojan Attack on Neural Network☆190Mar 25, 2022Updated 3 years ago
- ☆38Feb 7, 2024Updated 2 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆37Apr 19, 2023Updated 2 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Nov 5, 2024Updated last year
- ☆15Dec 7, 2023Updated 2 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆105Nov 18, 2022Updated 3 years ago
- A list of backdoor learning resources☆1,161Jul 31, 2024Updated last year
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Jun 2, 2022Updated 3 years ago
- Hidden backdoor attack on NLP systems☆47Nov 14, 2021Updated 4 years ago
- ☆19Jan 5, 2020Updated 6 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆21Sep 29, 2022Updated 3 years ago
- ☆19Mar 9, 2024Updated 2 years ago
- ☆27Feb 1, 2023Updated 3 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- This is the implementation of our paper 'Open-sourced Dataset Protection via Backdoor Watermarking', accepted by the NeurIPS Workshop on …☆23Oct 13, 2021Updated 4 years ago
- ☆82Jun 10, 2024Updated last year
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆27Oct 5, 2022Updated 3 years ago
- Code for the paper: "Leveraging speaker attribute information using multi task learning for speaker verification and diarization" present…☆26Oct 5, 2022Updated 3 years ago
- Unofficial implementation of the DeepMind papers "Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples…☆100Mar 4, 2022Updated 4 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 4 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Jul 22, 2023Updated 2 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆303Aug 25, 2025Updated 6 months ago
- ☆25Mar 24, 2023Updated 2 years ago
- [CCS 2021] TSS: Transformation-specific smoothing for robustness certification☆26Oct 3, 2023Updated 2 years ago