An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: poisoning-attack

hackingyseguridad/dnspoison

dnspoison inyecta respuestas dns con IP host falso

Language: Shell - Size: 328 KB - Last synced at: 19 days ago - Pushed at: 19 days ago - Stars: 0 - Forks: 0

EchoEth/eth-address-poisoning-tool

A complex and complete ethereum address poisoning tool

Size: 8.79 KB - Last synced at: 19 days ago - Pushed at: 19 days ago - Stars: 0 - Forks: 0

trojai/trojai

A repository to quickly generate synthetic data and associated trojaned deep learning models

Language: Python - Size: 9.27 MB - Last synced at: 23 days ago - Pushed at: almost 2 years ago - Stars: 77 - Forks: 23

edoardottt/offensive-onos

My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)

Language: Java - Size: 2.07 MB - Last synced at: about 1 month ago - Pushed at: 6 months ago - Stars: 17 - Forks: 1

HanxunH/Detect-CLIP-Backdoor-Samples

[ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining

Language: Jupyter Notebook - Size: 33.5 MB - Last synced at: about 1 month ago - Pushed at: 3 months ago - Stars: 7 - Forks: 2

HyeonjeongHa/MM-PoisonRAG

Official PyTorch implementation of "MM-PoisonRAG: Disrupting Multimodal RAG with Local and Global Poisoning Attacks"

Language: Python - Size: 28.5 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 3 - Forks: 0

warisgill/FedDefender

FedDefender is a novel defense mechanism designed to safeguard Federated Learning from the poisoning attacks (i.e., backdoor attacks).

Language: Python - Size: 37.1 KB - Last synced at: about 1 month ago - Pushed at: 10 months ago - Stars: 13 - Forks: 3

liu00222/PORE-Provably-Robust-Recommender-Systems-against-Data-Poisoning-Attacks

This repository contains the code for our USENIX Security'23 paper "PORE: Provably Robust Recommender Systems against Data Poisoning Attacks"

Language: Python - Size: 8.42 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 7 - Forks: 0

youpengl/FedCAP

[ACSAC '24] FedCAP: Robust Federated Learning via Customized Aggregation and Personalization

Language: Python - Size: 61.5 KB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

gurbaaz27/CS776A-Course-Project

Can Adversarial training defend against Poisoning attacks?

Language: Jupyter Notebook - Size: 44.7 MB - Last synced at: about 1 month ago - Pushed at: almost 3 years ago - Stars: 4 - Forks: 2

thinwayliu/Multimodal-Unlearnable-Examples

The code for ACM MM2024 (Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning)

Language: Python - Size: 19.7 MB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 3 - Forks: 0

null1024-ws/Poisoning-Attack-on-Code-Completion-Models

Paper "An LLM-Assisted Easy-to-Trigger Poisoning Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection"

Language: Python - Size: 58 MB - Last synced at: 11 months ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

awesome-recsys-poisoning/awesome-recsys-poisoning.github.io

Official Website of https://github.com/tamlhp/awesome-recsys-poisoning

Language: HTML - Size: 608 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

youpengl/FedCHAR

[UbiComp/IMWUT '23] Hierarchical Clustering-based Personalized Federated Learning for Robust and Fair Human Activity Recognition

Language: Python - Size: 9.37 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 16 - Forks: 4

matteo-giri/cybersecurity-project

Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers: Verification and Testing (university project for Cybersecurity)

Size: 1.95 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

Cinofix/sponge_poisoning_energy_latency_attack

Source code for the Energy-Latency Attacks via Sponge Poisoning paper.

Language: Python - Size: 1.69 MB - Last synced at: over 1 year ago - Pushed at: about 3 years ago - Stars: 10 - Forks: 1

LukasStruppek/Robust_Training_on_Poisoned_Samples

Source code for our paper "Leveraging Diffusion-Based Image Variations for Robust Training on Poisoned Data" (NeurIPS 2023 Workshop).

Language: Python - Size: 1.01 MB - Last synced at: 5 months ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 0

yuweisunn/attacking-distance-aware-attack

Language: Python - Size: 2.7 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 5 - Forks: 0

Nevermetyou65/thesis-gans-poisoning-attack

my first thesis paper's code

Language: Jupyter Notebook - Size: 43 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

xHaash/Venom-MiTM

Venom is an ARP-Poisoner that sniffs TLS requests to take advantage of SNI Leak and display all targets DNS traffic even if it is encrypted.

Language: Python - Size: 1.26 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 4 - Forks: 0

Gaurav7888/Adversarial-Attacks-and-Defence

Adversarial-Attacks-and-Defence

Language: Jupyter Notebook - Size: 10.2 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

git-disl/Perception-Poisoning

Perception Poisoning Attacks in Federated Learning

Language: Python - Size: 1.98 MB - Last synced at: almost 2 years ago - Pushed at: over 3 years ago - Stars: 4 - Forks: 1

SConsul/Adversarial_Attacks

Course Project for EE782. IIT Bombay, Autumn 2019

Language: Jupyter Notebook - Size: 48.2 MB - Last synced at: about 2 years ago - Pushed at: over 5 years ago - Stars: 6 - Forks: 8

jeremy313/FL-WBC

Official implementation of "FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective".

Language: Python - Size: 93.8 KB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 27 - Forks: 6

ssloxford/biometric-backdoors

Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"

Language: Jupyter Notebook - Size: 5.09 MB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 12 - Forks: 2

tanjuntao/Adversarial-Machine-Learning 📦

对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料

Size: 264 MB - Last synced at: about 2 years ago - Pushed at: almost 6 years ago - Stars: 75 - Forks: 21

jeremy313/non-iid-dataset-for-personalized-federated-learning

Official implementation of "FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective".

Language: Python - Size: 5.86 KB - Last synced at: about 2 years ago - Pushed at: almost 5 years ago - Stars: 60 - Forks: 21

Sanghyun-Hong/Gradient-Shaping

[Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping

Language: Python - Size: 950 MB - Last synced at: about 2 years ago - Pushed at: about 5 years ago - Stars: 10 - Forks: 0

annafabris/Poisoning-unlabeled-Dataset-for-Semi-Supervised-Learning

A Semi-supervised learning model (Ladder Network) to classify MNIST digits. A few attacks were executed on it with the target of misclassifying 4s with 9s.

Language: Python - Size: 31.4 MB - Last synced at: about 2 years ago - Pushed at: almost 3 years ago - Stars: 5 - Forks: 1

zphw/dns-cache-poisoning-demo

An isolated environment for DNS cache poisoning attack investigation and demonstration.

Language: Python - Size: 84 KB - Last synced at: about 2 years ago - Pushed at: over 4 years ago - Stars: 6 - Forks: 2

ctom2/seg-mia

Membership inference attacks on (poisoned) segmentation models; master's thesis

Language: Python - Size: 348 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 2 - Forks: 0

khale/elf-hijack

Example of using ELF hacking to inject malicious code into a target binary

Language: C - Size: 46.9 KB - Last synced at: about 2 years ago - Pushed at: about 5 years ago - Stars: 18 - Forks: 6

imranur-rahman/dns-cache-poisoning-attack-reloaded

Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.

Language: Python - Size: 28.7 MB - Last synced at: about 2 years ago - Pushed at: about 4 years ago - Stars: 2 - Forks: 4

mahdiabdollahpour/Security-and-Privacy-in-Machine-Learning

Implementations on SP in ML

Language: Jupyter Notebook - Size: 26.4 MB - Last synced at: about 2 years ago - Pushed at: about 4 years ago - Stars: 2 - Forks: 1

Vinayak2002/Poisoning_Attacks_in_FL

Simulation of FL in python for Digit Recognition ML model. Simulated poisoning attacks and studies their impact.

Language: Python - Size: 18.6 KB - Last synced at: about 2 years ago - Pushed at: almost 3 years ago - Stars: 0 - Forks: 0

Adk2001tech/Biometric-Backdoors

Research work on biometric security and template updation using Machine Learning.

Language: Jupyter Notebook - Size: 28.8 MB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 2 - Forks: 0

HectorTa1989/DNS-cache-poisoning-attack-investigation

An isolated environment for DNS cache poisoning attack investigation and demonstration.

Language: Python - Size: 96.7 KB - Last synced at: 3 months ago - Pushed at: over 3 years ago - Stars: 0 - Forks: 0

Related Keywords
poisoning-attack 37 federated-learning 8 security 6 deep-learning 6 backdoor-attacks 5 adversarial-attacks 5 machine-learning 5 adversarial-machine-learning 5 dns 4 dns-cache-poisoning 3 python 3 dns-poisoning 3 tensorflow 3 safety 2 scapy 2 networking 2 recommender-system 2 adversarial-examples 2 dns-server 2 privacy-protection 2 pytorch 2 poisoning-attacks 2 poisoning 2 biometrics 2 robustness 2 attack 2 fgsm-attack 1 defence 1 gradient-attack 1 object-detection 1 adversarial-networks 1 dns-spoofing 1 sniffing 1 sni-leak 1 mitm-framework 1 mitm-attack 1 mac-spoofing 1 mac-spoofer 1 dns-sniffer 1 arp-spoofing 1 arp-poisoning 1 ai-security 1 diffusion-models 1 malware-classifier 1 human-activity-recognition 1 template-matching 1 research-project 1 face-recognition 1 digit-recognition 1 privacy 1 model-stealing 1 membership-inference-attack 1 virtual-machine 1 system-security 1 spoofing-attack 1 spoofing 1 side-channel-attacks 1 side-channel 1 networking-concepts 1 dnsmasq 1 dns-cache 1 bind9 1 plt 1 got 1 elf-hijacking 1 code-injection 1 segmentation 1 semi-supervised-learning 1 tensorflow-privacy 1 security-vulnerability 1 defense-mechanism 1 evation-attack 1 facial-recognition 1 biometric-backdoors 1 neurips-2021 1 adversarial-perturbations 1 backdoors 1 backdoor-attack 1 backdoor 1 software-defined-networking 1 software-defined-network 1 sdn-controller 1 sdn 1 onos-app 1 onos 1 offensivesecurity 1 offensive-security 1 network-security 1 network-attacks 1 network 1 java 1 hacking 1 anomalydetection 1 anomaly-detection 1 anomalies-detection 1 deep-reinforcement-learning 1 deep-neural-networks 1 ethereum 1 eth-poisoning 1 poison 1