Skip to content
View Miraj-Rahman-AI's full-sized avatar

Block or report Miraj-Rahman-AI

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Adv-AI-Agents Adv-AI-Agents Public

    A professional development of production-grade AI agents including research assistants, coding agents, multi-agent systems, and enterprise RAG solutions built with Python, LangChain, GPT/Qwen, FAIS…

    Python 2

  2. RAI-RAG RAI-RAG Public

    Risk-Aware Introspective RAG (RAI-RAG) is a safety-aligned RAG framework integrating introspective reasoning, risk-aware retrieval gating, and secure evidence filtering to build trustworthy, robust…

    Python

  3. Pre-Trained-Attacks Pre-Trained-Attacks Public

    A unified framework for covert backdoor and feature-based adversarial attacks on pre-trained encoders in self-supervised learning. Includes light/object/entity triggers, feature alignment attacks, …

    Python 2

  4. BD-Attacks-Defenses BD-Attacks-Defenses Public

    A practical toolkit for implementing and evaluating backdoor attacks and defenses in deep learning. Includes BadNets, Blended attacks, and ShrinkPad defense. Ideal for researchers and students expl…

    Python 2

  5. CV-BD-Attacks CV-BD-Attacks Public

    Analyzing backdoor attacks in Federated Learning systems focused on computer vision. Includes implementations of various attack strategies, model configurations, and evaluation scripts to study sec…

    Python 2

  6. NLP-BD-Attacks NLP-BD-Attacks Public

    Analyzing backdoor attacks in Federated Learning systems focused on Natural Language Processing (NLP). Includes implementations of various attack strategies, model configurations, and evaluation sc…

    Python 1 2