[AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network
☆30Oct 15, 2024Updated last year
Alternatives and similar repositories for PLG-MI-Attack
Users that are interested in PLG-MI-Attack are comparing it to the libraries listed below
Sorting:
- ☆32May 2, 2021Updated 4 years ago
- ☆46Sep 24, 2023Updated 2 years ago
- [CVPR-2023] Re-thinking Model Inversion Attacks Against Deep Neural Networks☆43Nov 12, 2023Updated 2 years ago
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Dec 10, 2021Updated 4 years ago
- This is a PyTorch implementation of the paper "Reinforcement Learning-Based Black-Box Model Inversion Attacks" accepted by CVPR 2023.☆40May 4, 2023Updated 2 years ago
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆24Sep 11, 2025Updated 5 months ago
- ☆27Sep 23, 2022Updated 3 years ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆46Jul 18, 2025Updated 7 months ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆190Sep 23, 2025Updated 5 months ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- Official Repository for ResSFL (accepted by CVPR '22)☆26Jun 24, 2022Updated 3 years ago
- ☆52Feb 24, 2024Updated 2 years ago
- Official implementation of the paper "GANprintR: Improved Fakes and Evaluation of the State-of-the-Art in Face Manipulation Detection"☆25Apr 17, 2020Updated 5 years ago
- This is the official repository for the ECCV 2022 paper "RepMix: Representation Mixing for Robust Attribution of Synthesized Images"☆21Jul 22, 2022Updated 3 years ago
- model learning and test for tiny-imageNet☆25Oct 19, 2017Updated 8 years ago
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆63Sep 4, 2024Updated last year
- ☆12Oct 7, 2020Updated 5 years ago
- ☆34Dec 2, 2023Updated 2 years ago
- ☆37Nov 16, 2025Updated 3 months ago
- ☆35Dec 16, 2022Updated 3 years ago
- SAR Backprojection Implementations for the GOTCHA data set☆12Jan 28, 2024Updated 2 years ago
- Training pretrained deep neural network, Xception Net, with Face Forensics ++ Dataset, and implement two different losses to learn image …☆10Apr 29, 2020Updated 5 years ago
- Early Accepted in MICCAI 2023☆12Jul 11, 2023Updated 2 years ago
- AdvSV stands as the first dataset developed specifically for evaluating Speaker Verification (SV) systems against adversarial attacks. I…☆11Nov 21, 2023Updated 2 years ago
- (Advanced Engineering Informatics 2025) ThermoNeRF - Thermographic NeRF☆53Aug 28, 2025Updated 6 months ago
- ☆47Nov 17, 2022Updated 3 years ago
- ☆12Sep 26, 2024Updated last year
- [ICLR 2021] Group Equivariant Generative Adversarial Networks.☆14May 6, 2021Updated 4 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ☆11Mar 24, 2023Updated 2 years ago
- ☆12Jan 7, 2024Updated 2 years ago
- Code for the paper "Knowledge-Aware Federated Active Learning with Non-IID Data", ICCV2023☆10Sep 8, 2023Updated 2 years ago
- ☆10Oct 13, 2022Updated 3 years ago
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Few-shot Metric Adversarial Adaptation for Cross-machine Fault Diagnosis☆10Apr 7, 2025Updated 10 months ago
- Code accompanying the paper "Dimensions underlying the representational alignment of deep neural networks with humans"☆13Sep 2, 2025Updated 6 months ago
- Python implementation for the project titled "Optimization problems in vehicle route network design" developed at IIIT Delhi as part of m…☆13Dec 8, 2022Updated 3 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago