Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking attacks and defenses.
☆103Nov 2, 2019Updated 6 years ago
Alternatives and similar repositories for cyphercat
Users that are interested in cyphercat are comparing it to the libraries listed below
Sorting:
- Code for Membership Inference Attack against Machine Learning Models (in Oakland 2017)☆199Nov 15, 2017Updated 8 years ago
- Python package to create adversarial agents for membership inference attacks againts machine learning models☆46Feb 12, 2019Updated 7 years ago
- A library for running membership inference attacks against ML models☆152Dec 8, 2022Updated 3 years ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆85Nov 22, 2021Updated 4 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆84Feb 26, 2023Updated 3 years ago
- ☆45Nov 10, 2019Updated 6 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆39Jan 28, 2019Updated 7 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- ☆32Sep 2, 2024Updated last year
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆136Dec 8, 2022Updated 3 years ago
- ☆25Jan 20, 2019Updated 7 years ago
- Code for "Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment" (CCS 2019)☆49Dec 17, 2019Updated 6 years ago
- ☆19Mar 6, 2023Updated 2 years ago
- Membership Inference of Generative Models☆15Oct 2, 2019Updated 6 years ago
- A repo to download and preprocess the Purchase100 dataset extracted from Kaggle: Acquire Valued Shoppers Challenge☆12Jun 21, 2021Updated 4 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆68Sep 11, 2021Updated 4 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Jul 12, 2022Updated 3 years ago
- An awesome list of papers on privacy attacks against machine learning☆634Mar 18, 2024Updated last year
- Model extraction attacks on Machine-Learning-as-a-Service platforms.☆356Nov 22, 2020Updated 5 years ago
- Public implementation of the paper "On the Importance of Difficulty Calibration in Membership Inference Attacks".☆16Dec 1, 2021Updated 4 years ago
- Task-agnostic universal black-box attacks on computer vision neural network via procedural noise (CCS'19)☆56Dec 21, 2020Updated 5 years ago
- ☆22Sep 17, 2024Updated last year
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- Privacy Meter: An open-source library to audit data privacy in statistical and machine learning algorithms.☆700Apr 26, 2025Updated 10 months ago
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆59May 12, 2019Updated 6 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- ☆10Jun 1, 2022Updated 3 years ago
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".☆11Jun 16, 2023Updated 2 years ago
- ☆12Sep 26, 2024Updated last year
- ☆22Aug 15, 2022Updated 3 years ago
- ☆13Jun 17, 2024Updated last year
- Code for Auditing Data Provenance in Text-Generation Models (in KDD 2019)☆10Jun 18, 2019Updated 6 years ago
- ☆25Mar 24, 2023Updated 2 years ago
- Algorithms to recover input data from their gradient signal through a neural network☆314Apr 14, 2023Updated 2 years ago
- For Competition on Adversarial Attacks and Defenses 2018☆40Jan 4, 2019Updated 7 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Feb 12, 2020Updated 6 years ago
- ☆50Jan 19, 2019Updated 7 years ago