-
Hi
I couldn't run the backdoor example
python federatedscope/main.py --cfg scripts/attack_exp_scripts/backdoor_attack/backdoor_badnet_fedavg_convnet2_on_femnist.yaml
An error has raised
**(fs…
-
不知道什么情况,老板准备做游戏?还是做博彩?不清楚。让看下合约安全,然后给大家分享一下。不好说,两天时间,还要分析下几个Dapp的合约代码。还好之前自己学习过一点。然后现学现卖,搞了一下。想说的都在PDF里了。
PDF -> [smart contract security basicly](https://github.com/mylamour/blog/files/2366085/basi…
-
| Keywords | References | link |
|-------------------------------|-------------------------------|---------------------------------|
| D…
-
[Graph backdoor](https://www.usenix.org/conference/usenixsecurity21/presentation/xi)
```bib
@inproceedings{xi2021graph,
title={Graph backdoor},
author={Xi, Zhaohan and Pang, Ren and Ji, Shouli…
-
- @ratnadeepb, Comprehension: Backdoor coupling vulnerabilities occur often in electrical systems
- @hjaensch7, Critical: Who is responsible for making sure hardware is secure?
- @chandaweia, Critic…
-
https://github.com/jhcknzzm/Federated-Learning-Backdoor/blob/a7ef36afc5c5dfe7dbb233e8d7f35c141cefeffb/FL_Backdoor_CV/image_helper.py#L271
I have a question about the testing dataset about backdoor …
-
Thanks
-
I've grown increasingly concerned with supply chain attacks, which Rust is still vulnerable to, as is pretty much any other growing software ecosystem.
For this reason, we should invest some time i…
-
# Introduction to Cyber security
## Cyber security definition
Cyber security is defined as the application of technologies, controls, and processes to protect systems, networks, programs, data, and …
-
I read your paper, and saw the table 2. And I found BN(BadNets), ESB(TrojanNet), TNN(TrojanNN), RB(reflection backdoor), LB(latent backdoor), IMC.
![image](https://user-images.githubusercontent.…