☆34May 2, 2021Updated 5 years ago
Alternatives and similar repositories for GMI-Attack
Users that are interested in GMI-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆32Oct 15, 2024Updated last year
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Dec 10, 2021Updated 4 years ago
- ☆46Sep 24, 2023Updated 2 years ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆48Jul 18, 2025Updated 9 months ago
- [CVPR-2023] Re-thinking Model Inversion Attacks Against Deep Neural Networks☆43Nov 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆12Nov 10, 2020Updated 5 years ago
- [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆221Apr 3, 2026Updated last month
- This is a PyTorch implementation of the paper "Reinforcement Learning-Based Black-Box Model Inversion Attacks" accepted by CVPR 2023.☆40May 4, 2023Updated 3 years ago
- ☆27Sep 23, 2022Updated 3 years ago
- Official Repository for ResSFL (accepted by CVPR '22)☆26Jun 24, 2022Updated 3 years ago
- [ECCV-2024 oral] Source code for our paper "A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion At…☆24Sep 22, 2024Updated last year
- Code for "Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment" (CCS 2019)☆49Dec 17, 2019Updated 6 years ago
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆24Sep 11, 2025Updated 7 months ago
- Code for NDSS 2022 paper "MIRROR: Model Inversion for Deep Learning Network with High Fidelity"☆27May 9, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Research into model inversion on SplitNN☆18Feb 20, 2024Updated 2 years ago
- ☆13Apr 13, 2025Updated last year
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆193Sep 23, 2025Updated 7 months ago
- Vue + SpringBoot + RocketMQ + Redis 智能AI视频解析平台。用户可通过 本地视频 或 在线链接 ,一键提取音频,文字,AI总结概括。涉及消息队列异步化、分布式锁防并发、分片上传与断点续传等等☆73Mar 21, 2026Updated last month
- Official Pytorch implementation of IJCAI'21 paper "GraphMI: Extracting Private Graph Data from Graph Neural Networks"☆13Nov 19, 2021Updated 4 years ago
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- ☆17Mar 28, 2022Updated 4 years ago
- ☆15Nov 29, 2020Updated 5 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆84Feb 26, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data☆34Dec 8, 2018Updated 7 years ago
- ☆13Sep 26, 2024Updated last year
- Source Code for the JAIR Paper "Does CLIP Know my Face?" (Demo: https://huggingface.co/spaces/AIML-TUDA/does-clip-know-my-face)☆16Jul 9, 2024Updated last year
- Backdoor Cleansing with Unlabeled Data (CVPR 2023)☆12Apr 6, 2023Updated 3 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- [Neurips 2025]StegoZip: Enhancing Linguistic Steganography Payload in Practice with Large Language Models☆30Dec 4, 2025Updated 5 months ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- [ICML 2024] Sparse Model Inversion: Efficient Inversion of Vision Transformers with Less Hallucination☆14Apr 29, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Perform multi-party computation on machine learning applications☆22Jun 21, 2022Updated 3 years ago
- ☆17Apr 22, 2026Updated last week
- ☆13Apr 26, 2022Updated 4 years ago
- The open-sourced Python toolbox for backdoor attacks and defenses.☆660Sep 27, 2025Updated 7 months ago
- This repository contains Python code for the paper "Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearni…☆20Apr 3, 2024Updated 2 years ago
- An awesome list of papers on privacy attacks against machine learning☆634Mar 18, 2024Updated 2 years ago
- Code repo for the paper "Privacy-aware Compression for Federated Data Analysis".☆18May 31, 2023Updated 2 years ago