The authors of L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set have not publicly listed the code yet.

Request code directly from the authors:

Get an expert to implement this paper:

(OR if you have code to share with the community, please add it here 😊🙏 )