There are no reviews yet. Be the first to send feedback to the community and the maintainers!
awesome-LLM-game-agent-papers
A Survey on Large Language Model-Based Game AgentsPokeLLMon
DataPoisoning_FL
Code for Data Poisoning Attacks Against Federated Learning SystemsTOG
Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While DNN-powered object detection systems celebrate many life-enriching opportunities, they also open doors for misuse and abuse. This project presents a suite of adversarial objectness gradient attacks, coined as TOG, which can cause the state-of-the-art deep object detection networks to suffer from untargeted random attacks or even targeted attacks with three types of specificity: (1) object-vanishing, (2) object-fabrication, and (3) object-mislabeling. Apart from tailoring an adversarial perturbation for each input image, we further demonstrate TOG as a universal attack, which trains a single adversarial perturbation that can be generalized to effectively craft an unseen input with a negligible attack time cost. Also, we apply TOG as an adversarial patch attack, a form of physical attacks, showing its ability to optimize a visually confined patch filled with malicious patterns, deceiving well-trained object detectors to misbehave purposefully.BERT4ETH
BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection (WWW23)GPTLens
Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives (TPS23)EllipticPlusPlus
Elliptic++ Dataset: A Graph Network of Bitcoin Blockchain Transactions and Wallet AddressesCPL_attack
awesome_LLM-harmful-fine-tuning-papers
A survey on harmful fine-tuning issue for large language modelscale-fl
Code for ScaleFLAdaTrace
Utility-aware synthesis of differentially private and attack-resilient location tracesLRBench
A learning rate recommending and benchmarking tool.CLDP
Secure and utility-aware data collection with condensed local differential privacyFastSwap
Dynamic and Transparent Memory Sharing for Accelerating Big Data Analytics Workloads in Virtualized CloudVaccine
This is the official code for the paper "Vaccine: Perturbation-aware Alignment for Large Language Models" (NeurIPS2024)EnsembleBench
A holistic framework for promoting high diversity ensemble learning.XMemPod
A disaggregated memory orchestration system that virtualizes cluster wide memory to scale data intensive, large memory workloads in virtualized cloudsFed-CDP
Gradient-Leakage Resilient Federated LearningDLEdge
This project accelerates deep learning models on the edge with the support of running ensemble learning for performance improvement. The current version accelerates YOLO object detectors with Intel Neural Compute Stick 2 using parallel programming.Lockdown
A backdoor defense for federated learning via isolated subspace training (NeurIPS2023)EENet
Code for Adaptive Deep Neural Network Inference Optimization with EENetGTDLBench
Benchmarking Deep Learning FrameworksEMO
Efficient Multi-Object Tracking for Edge devicesDP-Ensemble
Diversity Optimized EnsembleSTDLens
Lisa
This is the official code for the paper "Lazy Safety Alignment for Large Language Models against Harmful Fine-tuning" (NeurIPS2024)DP_modelpublishing
GTAttackPod
Deep neural networks (DNNs) have demonstrated impressive performance on many challenging machine learning tasks. However, DNNs are vulnerable to adversarial inputs generated by adding maliciously crafted perturbations to the benign inputs. As a growing number of attacks have been reported to generate adversarial inputs of varying sophistication, the defense-attack arms race has been accelerated. This project collects state-of-the-art attack algorithms and organizes them with a easy-to-use interface.EVA
Fast Edge Video AnalyticsZipZap
Perception-Poisoning
Perception Poisoning Attacks in Federated LearningBooster
This is the official code for the paper "Booster: Tackling Harmful Fine-tuning for Large Language Models via Attenuating Harmful Perturbation".DLForecast
Graph mining of the bitcoin transaction data for tasks such as transaction prediction.HQ-Ensemble
Hierarchical Ensemble PruningValet
Efficient Orchestration of Host and Remote Shared Memory for Memory Intensive WorkloadsHeteRobust
recap
Code for CVPR24 Paper - Resource-Efficient Transformer Pruning for Finetuning of Large ModelsMSJE
MSJE Pytorch implementationmembership_vulnerability
GTModelZoo
ModelCloak
Code for ICDM 2023 Model Cloaking against Gradient LeakageMD-CNN
Network Code for Multi-Dimension Convolutional Neural Network for Bug LocalizationGRING-App-Face_Exp_recog
G-RING application : Face Expression Recognition Federated LearningFUSE
Robust Object Detection Fusion Against DeceptionGRING-App-Disease_Classification
G-RING application : Implementation of disease classification federated learning task on G-RINGPFT
gt-mobisim
Simulator for generating mobility traces and query traces for large numbers of mobile agents moving in a road network.LRBenchPlusPlus
GRING
TripleBit
TripleBit, a fast and compact system for large scale RDF graph. This is a mirror of https://github.com/CGCL-codes/TripeBit.SEJE
SEJE Pytorch implementationllm-topla
Love Open Source and this site? Check out how you can help us