zhenxianglance / RE-paperView external linksLinks
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing
☆14Feb 18, 2021Updated 4 years ago
Alternatives and similar repositories for RE-paper
Users that are interested in RE-paper are comparing it to the libraries listed below
Sorting:
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆44Oct 24, 2023Updated 2 years ago
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆27Oct 5, 2022Updated 3 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- ☆37Oct 17, 2024Updated last year
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- 2019_操作系统实验_16281047☆11Jun 15, 2019Updated 6 years ago
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆48Apr 27, 2022Updated 3 years ago
- ☆37Apr 9, 2021Updated 4 years ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆13Aug 25, 2021Updated 4 years ago
- ☆10Dec 18, 2024Updated last year
- Injecting watermarks to protein sequences for privacy protection in biosecurity☆10Oct 1, 2024Updated last year
- ☆11Nov 30, 2025Updated 2 months ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆14Mar 29, 2024Updated last year
- Source Code Search☆11Nov 16, 2023Updated 2 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- AgentSmith is a java agent that reloads your classes while your application is running. It's like JRebel, just much less powerful. It's e…☆15Nov 6, 2012Updated 13 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆65Nov 14, 2025Updated 3 months ago
- CelebA HQ Face Identity and Attributes Recognition using PyTorch☆42Nov 3, 2023Updated 2 years ago
- Interactive Article Explaining Isomap☆44Jan 6, 2026Updated last month
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆19Sep 18, 2025Updated 4 months ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- A oversampling approach☆11Nov 21, 2018Updated 7 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 3 years ago
- Code and data release of the paper Enhancing LLM Complex Problem-Solving with Hybrid Thinking and Dynamic Workflows☆14Oct 4, 2024Updated last year
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- ☆12May 27, 2022Updated 3 years ago
- USTC网络安全实验室网站源码☆11Sep 1, 2022Updated 3 years ago
- 使用yolox训练自己的数据集☆13May 9, 2023Updated 2 years ago
- Code for SIGKDD'2021 paper: Deep Clustering based Fair Outlier Detection☆11Oct 15, 2021Updated 4 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆37Jul 22, 2024Updated last year
- ☆13May 17, 2025Updated 8 months ago
- PyTorch Implementation of MeshGraphNets☆17May 3, 2023Updated 2 years ago
- ☆50Aug 30, 2024Updated last year