zhaitongqing233 / Backdoor-attack-against-speaker-verificationView external linksLinks
Pytorch implementation of Backdoor Attack against Speaker Verification
☆28Sep 19, 2023Updated 2 years ago
Alternatives and similar repositories for Backdoor-attack-against-speaker-verification
Users that are interested in Backdoor-attack-against-speaker-verification are comparing it to the libraries listed below
Sorting:
- ☆10Oct 13, 2022Updated 3 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Jun 29, 2021Updated 4 years ago
- TDY-CNN for text-independent speaker verification☆19Nov 7, 2022Updated 3 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- ☆28Jun 17, 2024Updated last year
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆24May 25, 2023Updated 2 years ago
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- ☆14Jan 4, 2025Updated last year
- ☆15Apr 7, 2023Updated 2 years ago
- Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"☆11Nov 29, 2021Updated 4 years ago
- ☆37Feb 7, 2024Updated 2 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆35Apr 19, 2023Updated 2 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆105Aug 2, 2022Updated 3 years ago
- ☆15Dec 7, 2023Updated 2 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Nov 5, 2024Updated last year
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆105Nov 18, 2022Updated 3 years ago
- A list of backdoor learning resources☆1,158Jul 31, 2024Updated last year
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Jun 2, 2022Updated 3 years ago
- ☆26Jun 5, 2024Updated last year
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆44Nov 20, 2024Updated last year
- Hidden backdoor attack on NLP systems☆47Nov 14, 2021Updated 4 years ago
- ☆19Jan 5, 2020Updated 6 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆86Jun 27, 2023Updated 2 years ago
- ☆19Mar 9, 2024Updated last year
- ☆18Jul 1, 2021Updated 4 years ago
- Repository for the source code and adversarial samples of FoolHD☆18Jan 4, 2022Updated 4 years ago
- ☆27Feb 1, 2023Updated 3 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- ☆23Aug 24, 2020Updated 5 years ago
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆27Oct 5, 2022Updated 3 years ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Jul 22, 2023Updated 2 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆27Nov 18, 2024Updated last year
- ☆26Dec 14, 2021Updated 4 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 4 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆302Aug 25, 2025Updated 5 months ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago