[AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack
☆15Mar 29, 2024Updated last year
Alternatives and similar repositories for DFHL-RS-Attack
Users that are interested in DFHL-RS-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆75Apr 1, 2024Updated last year
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- ☆13Feb 21, 2025Updated last year
- Query-Efficient Data-Free Learning from Black-Box Models☆23Mar 20, 2023Updated 3 years ago
- Code of Data-Free Knowledge Distillation via Feature Exchange and Activation Region Constraint☆21Oct 23, 2023Updated 2 years ago
- ☆21Jul 26, 2025Updated 7 months ago
- Official Source Code of "Exploring Effective Data for Surrogate Training Towards Black-box Attack" and "STDatav2: Accessing Efficient Bla…☆21Apr 16, 2025Updated 11 months ago
- ☆39Nov 16, 2025Updated 4 months ago
- Code for "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples" (NDSS 2020)☆22Nov 14, 2020Updated 5 years ago
- Watermarking Text Generated by Black-Box Language Models☆39Dec 9, 2023Updated 2 years ago
- The relevant codes for "GANI: Global Attacks on Graph Neural Networks via Imperceptible Node Injections".☆14Mar 21, 2024Updated 2 years ago
- [CVPR 2024] "Transferable Structural Sparse Adversarial Attack Via Exact Group Sparsity Training", Di Ming, Peng Ren, Yunlong Wang, Xin …☆16Jun 11, 2024Updated last year
- [ICLR 2025] A Closer Look at Machine Unlearning for Large Language Models☆46Dec 4, 2024Updated last year
- ☆34Mar 28, 2022Updated 3 years ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆32Oct 15, 2024Updated last year
- PyTorch implementation of the paper: CASAGPT: Cuboid Arrangement and Scene Assembly for Interior Design [CVPR 2025]☆14Apr 5, 2025Updated 11 months ago
- ☆11May 18, 2025Updated 10 months ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- The official project website of "Small Scale Data-Free Knowledge Distillation" (SSD-KD for short, published in CVPR 2024).☆22Jun 13, 2024Updated last year
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆43Oct 12, 2023Updated 2 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- ☆34Dec 2, 2023Updated 2 years ago
- Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Dec 16, 2025Updated 3 months ago
- [ICCV 2025] The official code of the paper "Deciphering Cross-Modal Alignment in Large Vision-Language Models with Modality Integration R…☆111Jul 9, 2025Updated 8 months ago
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated 10 months ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 6 months ago
- This repository includes main notebook of the code for our proposed RCGAN☆12Apr 10, 2020Updated 5 years ago
- Black-box Few-shot Knowledge Distillation☆14Jul 19, 2022Updated 3 years ago
- This is the official code for the paper "Ad2Attack: Adaptive Adversarial Attack for Real-Time UAV Tracking".☆28Sep 25, 2021Updated 4 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- ☆52Feb 24, 2024Updated 2 years ago
- ☆18Jul 18, 2024Updated last year
- An audio steganalysis method based on CNN in the time domain.☆12Feb 25, 2021Updated 5 years ago
- ☆13Jun 10, 2018Updated 7 years ago
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- The code of paper: Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing (CVPR 2024))☆19Mar 12, 2024Updated 2 years ago
- This is the official implementation of NNSplitter (ICML'23)☆12Jun 11, 2024Updated last year
- ☆94Mar 23, 2021Updated 5 years ago