对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料
-
Updated
Jun 3, 2019
对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料
Course Project for EE782. IIT Bombay, Autumn 2019
Example of using ELF hacking to inject malicious code into a target binary
[Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping
Official implementation of "FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective".
An isolated environment for DNS cache poisoning attack investigation and demonstration.
dnspoison inyecta respuestas dns con IP host falso
Implementations on Security and Privacy in ML; Evasion Attack, Model Stealing, Model Poisoning, Membership Inference Attacks, ...
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
An isolated environment for DNS cache poisoning attack investigation and demonstration.
Official implementation of "FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective".
Perception Poisoning Attacks in Federated Learning
Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"
Source code for the Energy-Latency Attacks via Sponge Poisoning paper.
Simulation of FL in python for Digit Recognition ML model. Simulated poisoning attacks and studies their impact.
Can Adversarial training defend against Poisoning attacks?
Research work on biometric security and template updation using Machine Learning.
Membership inference attacks on (poisoned) segmentation models; master's thesis
A Semi-supervised learning model (Ladder Network) to classify MNIST digits. A few attacks were executed on it with the target of misclassifying 4s with 9s.
Adversarial-Attacks-and-Defence
Add a description, image, and links to the poisoning-attack topic page so that developers can more easily learn about it.
To associate your repository with the poisoning-attack topic, visit your repo's landing page and select "manage topics."