zqypku / mm_poison
☆20Updated last year
Alternatives and similar repositories for mm_poison
Users that are interested in mm_poison are comparing it to the libraries listed below
Sorting:
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆26Updated 5 months ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆49Updated last year
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆20Updated last year
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated last year
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆32Updated 9 months ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆36Updated last year
- ☆44Updated last year
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification☆11Updated last year
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆14Updated 6 months ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆17Updated 9 months ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆18Updated 2 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 2 years ago
- Official Code for ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users (NeurIPS 2024)☆16Updated 6 months ago
- Backdooring Multimodal Learning☆26Updated 2 years ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆26Updated 2 months ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆11Updated 7 months ago
- A toolbox for backdoor attacks.☆21Updated 2 years ago
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Updated last year
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆34Updated 8 months ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆19Updated 2 years ago
- [IEEE S&P 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆23Updated 3 weeks ago
- ☆19Updated 2 years ago
- ☆31Updated 3 years ago
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆30Updated 2 years ago
- Code Repo for the NeurIPS 2023 paper "VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models"☆23Updated this week
- ☆18Updated 2 years ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆26Updated 8 months ago
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆35Updated 6 months ago
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆15Updated last year
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆30Updated 3 weeks ago