Hydrino / ACGAN_cifar10
A PyTorch implementation of Auxiliary Classifier GAN to generate CIFAR10 images.
☆47Updated 6 years ago
Alternatives and similar repositories for ACGAN_cifar10:
Users that are interested in ACGAN_cifar10 are comparing it to the libraries listed below
- Official implementation of "GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators" (NeurIPS 2020)☆68Updated 2 years ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Updated 4 years ago
- Code for AAAI 2021 Paper "Membership Privacy for Machine Learning Models Through Knowledge Transfer"☆11Updated 3 years ago
- Implementation of adversarial training under fast-gradient sign method (FGSM), projected gradient descent (PGD) and CW using Wide-ResNet-…☆39Updated 4 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆48Updated 2 years ago
- ☆41Updated last year
- Pytorch implementation of a Conditional WGAN with Gradient Penalty☆36Updated 5 years ago
- The reproduction of the paper Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.☆60Updated last year
- Improved Techniques for Training GANs for cifar10 dataset☆18Updated last year
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆25Updated 3 months ago
- Adversarial attacks and defenses against federated learning.☆15Updated last year
- ☆25Updated 3 years ago
- The source code for ICML2021 paper When Does Data Augmentation Help With Membership Inference Attacks?☆8Updated 3 years ago
- There are my Pytorch codes for charactering adversarial subspace using local intrinsic dimensionality.☆12Updated 2 years ago
- Data-Free Knowledge Distillation☆20Updated 2 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆55Updated 5 years ago
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆29Updated 3 years ago
- Code for "Label-Consistent Backdoor Attacks"☆52Updated 4 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆29Updated 4 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆64Updated 3 years ago
- This is an official Tensorflow-2 implementation of Federated Continual Learning with Inter-Client Weighted Transfer☆102Updated 3 years ago
- ☆52Updated last year
- FedBE: Making Bayesian Model Ensemble Applicable to Federated Learning☆38Updated last year
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆17Updated 11 months ago
- Contains implementation of denoising algorithms.☆9Updated 4 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 2 years ago
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆32Updated 4 months ago
- Implementation of a differentially private generative adversarial network.☆11Updated 6 years ago
- The code for our Updates-Leak paper☆17Updated 4 years ago
- Official implementation of "GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models" (CCS 2020)☆47Updated 2 years ago