Pinned Repositories
backdoor
Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and Privacy 2019.
keras-inception-resnet-v2
The Inception-ResNet v2 model using Keras (with weight files)
mlaas
CS273 Class Project
RecursiveHierarchicalClustering
Use iterative feature pruning to identify hierarchical clusters.
translearn
Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
bolunwang's Repositories
bolunwang/backdoor
Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and Privacy 2019.
bolunwang/translearn
Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
bolunwang/keras-inception-resnet-v2
The Inception-ResNet v2 model using Keras (with weight files)
bolunwang/mlaas
CS273 Class Project
bolunwang/RecursiveHierarchicalClustering
Use iterative feature pruning to identify hierarchical clusters.