Backdoor Attack Defenses ML Frameworks
Tools, datasets, and implementations for studying backdoor attacks and defenses in deep learning models, including attack methods, detection techniques, and mitigation strategies. Does NOT include general adversarial attacks, model inversion attacks as primary focus, or other security vulnerabilities unrelated to backdoors.
There are 33 backdoor attack defenses frameworks tracked. 1 score above 50 (established tier). The highest-rated is QData/TextAttack at 58/100 with 3,377 stars.
Get all 33 projects as JSON
curl "https://pt-edge.onrender.com/api/v1/datasets/quality?domain=ml-frameworks&subcategory=backdoor-attack-defenses&limit=20"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
| # | Framework | Score | Tier |
|---|---|---|---|
| 1 |
QData/TextAttack
TextAttack 🐙 is a Python framework for adversarial attacks, data... |
|
Established |
| 2 |
ebagdasa/backdoors101
Backdoors Framework for Deep Learning and Federated Learning. A light-weight... |
|
Emerging |
| 3 |
THUYimingLi/backdoor-learning-resources
A list of backdoor learning resources |
|
Emerging |
| 4 |
zhangzp9970/MIA
Unofficial pytorch implementation of paper: Model Inversion Attacks that... |
|
Emerging |
| 5 |
LukasStruppek/Plug-and-Play-Attacks
[ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks:... |
|
Emerging |
| 6 |
VinAIResearch/Warping-based_Backdoor_Attack-release
WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021) |
|
Emerging |
| 7 |
YiZeng623/I-BAU
Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of... |
|
Emerging |
| 8 |
softsys4ai/athena
Athena: A Framework for Defending Machine Learning Systems Against... |
|
Emerging |
| 9 |
penghui-yang/awesome-data-poisoning-and-backdoor-attacks
A curated list of papers & resources linked to data poisoning, backdoor... |
|
Emerging |
| 10 |
SewoongLab/spectre-defense
Defending Against Backdoor Attacks Using Robust Covariance Estimation |
|
Emerging |
| 11 |
HanxunH/CognitiveDistillation
[ICLR2023] Distilling Cognitive Backdoor Patterns within an Image |
|
Emerging |
| 12 |
zihao-ai/Awesome-Backdoor-in-Deep-Learning
A curated list of papers & resources on backdoor attacks and defenses in... |
|
Emerging |
| 13 |
YiZeng623/frequency-backdoor
ICCV 2021, We find most existing triggers of backdoor attacks in deep... |
|
Emerging |
| 14 |
Zayden-Cyber/Backdoor
# BackdoorThis repository contains a Python-based backdoor and listener... |
|
Emerging |
| 15 |
QwQ2000/WSDM26-Graph-Unlearning-Inversion
WSDM'26 full paper -- "Unlearning Inversion Attack for Graph Neural Networks" |
|
Emerging |
| 16 |
csdongxian/ANP_backdoor
Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored... |
|
Emerging |
| 17 |
Megum1/UNIT
[ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening |
|
Emerging |
| 18 |
HanxunH/Detect-CLIP-Backdoor-Samples
[ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining |
|
Emerging |
| 19 |
vtu81/backdoor_attack
Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10. |
|
Emerging |
| 20 |
ffhibnese/Model-Inversion-Attack-ToolBox
A comprehensive toolbox for model inversion attacks and defenses, which is... |
|
Emerging |
| 21 |
pavlosdais/PriSM
[TMLR'26] PriSM: Prior-Guided Search Methods for Query Efficient Black-Box... |
|
Emerging |
| 22 |
Megum1/BEAGLE
[NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense |
|
Emerging |
| 23 |
JoyRiderJie/backdoor-attack
Here is a curated list of papers and resources on backdoor attacks and... |
|
Emerging |
| 24 |
AndrewZhou924/Awesome-model-inversion-attack
[arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and... |
|
Emerging |
| 25 |
jinminhao/PANTS
[Usenix Security '25] Robustifying ML-powered Network Classifiers with PANTS |
|
Experimental |
| 26 |
Cinofix/sponge_poisoning_energy_latency_attack
Source code for the Energy-Latency Attacks via Sponge Poisoning paper. |
|
Experimental |
| 27 |
Megum1/LOTUS
[CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning |
|
Experimental |
| 28 |
xiaolin-cs/BackTime
BackTime: Backdoor Attacks on Multivariate Time Series Forecasting |
|
Experimental |
| 29 |
zlaabsi/adversarial-backdoor-attack-defence
Adversarial and Backdoor Attack + Defence |
|
Experimental |
| 30 |
mpuodziukas-labs/adversarial-ml-toolkit
Adversarial ML toolkit: FGSM, PGD, prompt injection, data poisoning, OWASP... |
|
Experimental |
| 31 |
caohch-1/Paper-Reading-DL-Security
简单记录一下读过的DL-Security相关比较有意思的paper,方便以后要用的时候找到 |
|
Experimental |
| 32 |
AyoubAchourIT/mnist-backdoor-attack
Backdoor attack on MNIST via training data poisoning. Experimental study of... |
|
Experimental |
| 33 |
lena-lenkeit/llm-adversarial-attacks
Adversarial attacks on LLMs, for influencing outputs of hidden layer linear... |
|
Experimental |