awesome-backdoor-resources
Backdoor learning is an emerging research area focusing on the security issues in the training process of machine learning algorithms. It is critical for ensuring the safe adoption of third-party training resources or models in real-world applications.
https://github.com/xiaomingx/awesome-backdoor-resources
Last synced: 17 days ago
JSON representation
-
Image and Video Classification
-
Non-poisoning-based Attack
- [link - needles-in-a-haystack)
- [code
- [pdf - Replacement-Attack)
- [code
- [code
- [code
- [code
- [link
- [code
- [link
- [code
- [link
- [link
-
Transfer Learning
-
Acoustics Signal Processing
-
Semi-Supervised and Self-Supervised Learning
-
Poisoning-based Attack
- [code
- [code
- [code
- [code
- [code
- [code
- [code
- [pdf - based_Backdoor_Attack-release)
- [pdf - Agent)
- [code
- [code
- [code
- [code
- [pdf - Agent)
- [pdf - Agent)
-
Reinforcement Learning
- Lun Wang et al.
- Shubham Kumar Bharti et al. - Defense-in-RL)
- Shubham Kumar Bharti et al. - Defense-in-RL)
- Yanjiao Chen et al.
- Yanjiao Chen et al.
- Lun Wang et al.
- Lun Wang et al.
-
Quantization
- Sanghyun Hong et al. - AI-Systems-Group/Qu-ANTI-zation)
- Huy Phan et al. - RIBAC)
- Huy Phan et al. - RIBAC)
- Sanghyun Hong et al. - AI-Systems-Group/Qu-ANTI-zation)
- Sanghyun Hong et al. - AI-Systems-Group/Qu-ANTI-zation)
- Huy Phan et al. - RIBAC)
-
Natural Language Processing
- Qian Lou et al. - ML-Research/TrojText)
- Xiaofei Sun et al.
- Xiangrui Cai et al.
- Biru Zhu et al. - fitting)
- Yingqi Liu et al.
- Yingqi Liu et al.
- Qian Lou et al. - ML-Research/TrojText)
- Xiaofei Sun et al.
- Xiangrui Cai et al.
- Biru Zhu et al. - fitting)
-
Graph Neural Networks
-
Point Cloud
-
Vision Transformer
-
Diffusion Model
-
Medical Science
-
Cybersecurity
- [link - hit/VulnerGAN-py) *Information Sciences*, 2022.
-
Detection and Tracking
-
Evaluation and Discussion
-
Others
-
-
Survey
-
Toolbox
-
Dissertation and Thesis
-
Competition
Programming Languages
Categories
Sub Categories
Non-poisoning-based Attack
59
Poisoning-based Attack
54
Natural Language Processing
10
Graph Neural Networks
9
Acoustics Signal Processing
7
Reinforcement Learning
7
Semi-Supervised and Self-Supervised Learning
7
Transfer Learning
7
Quantization
6
Point Cloud
6
Diffusion Model
4
Vision Transformer
4
Others
4
Medical Science
3
Evaluation and Discussion
3
Detection and Tracking
2
Cybersecurity
1
Keywords
backdoor-attacks
6
trustworthy-ai
4
adversarial-attacks
4
backdoor-defenses
2
backdoor-learning
2
trustworthy-machine-learning
2
deep-learning
2
image-classification
2
pytorch
2
nlp
2
adversarial-examples
2
adversarial-machine-learning
2
ai
2
artificial-intelligence
2
attack
2
blue-team
2
evasion
2
extraction
2
inference
2
machine-learning
2
poisoning
2
privacy
2
python
2
red-team
2
trusted-ai
2