[AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network
☆32Oct 15, 2024Updated last year
Alternatives and similar repositories for PLG-MI-Attack
Users that are interested in PLG-MI-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ECCV-2024 oral] Source code for our paper "A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion At…☆24Sep 22, 2024Updated last year
- ☆46Sep 24, 2023Updated 2 years ago
- [CVPR-2023] Re-thinking Model Inversion Attacks Against Deep Neural Networks☆43Nov 12, 2023Updated 2 years ago
- This is a PyTorch implementation of the paper "Reinforcement Learning-Based Black-Box Model Inversion Attacks" accepted by CVPR 2023.☆40May 4, 2023Updated 2 years ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆48Jul 18, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆27Sep 23, 2022Updated 3 years ago
- ☆13Apr 13, 2025Updated last year
- ☆12Nov 10, 2020Updated 5 years ago
- [Neurips 2025]StegoZip: Enhancing Linguistic Steganography Payload in Practice with Large Language Models☆30Dec 4, 2025Updated 4 months ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆193Sep 23, 2025Updated 7 months ago
- Code for NDSS 2022 paper "MIRROR: Model Inversion for Deep Learning Network with High Fidelity"☆27May 9, 2023Updated 2 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated 2 years ago
- Source Code for the JAIR Paper "Does CLIP Know my Face?" (Demo: https://huggingface.co/spaces/AIML-TUDA/does-clip-know-my-face)☆16Jul 9, 2024Updated last year
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆53Feb 24, 2024Updated 2 years ago
- Official Repository for ResSFL (accepted by CVPR '22)☆26Jun 24, 2022Updated 3 years ago
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆65Sep 4, 2024Updated last year
- ☆35Dec 2, 2023Updated 2 years ago
- Vue + SpringBoot + RocketMQ + Redis 智能AI视频解析平台。用户可通过 本地视频 或 在线链接 ,一键提取音频,文字,AI总结概括。涉及消息队列异步化、分布式锁防并发、分片上传与断点续传等等☆69Mar 21, 2026Updated last month
- Official implementation of the paper "GANprintR: Improved Fakes and Evaluation of the State-of-the-Art in Face Manipulation Detection"☆25Apr 17, 2020Updated 6 years ago
- [TDSC 2025] InferDPT: Privacy-Preserving Inference for Closed-box Large Language Model☆39Nov 16, 2025Updated 5 months ago
- Official Pytorch implementation of IJCAI'21 paper "GraphMI: Extracting Private Graph Data from Graph Neural Networks"☆13Nov 19, 2021Updated 4 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆84Feb 26, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- This is the official repository for the ECCV 2022 paper "RepMix: Representation Mixing for Robust Attribution of Synthesized Images"☆21Jul 22, 2022Updated 3 years ago
- A data-free backdoor detector for deep neural networks☆21Mar 8, 2023Updated 3 years ago
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- ☆35Dec 16, 2022Updated 3 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- Early Accepted in MICCAI 2023☆12Jul 11, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- DanDanPlay API, but Python☆14Jan 23, 2023Updated 3 years ago
- ☆13Jun 10, 2018Updated 7 years ago
- 基于PC-DDSP和nsf-HiFiGAN的声码器☆18Jul 17, 2023Updated 2 years ago
- [CVPR-2024] NAYER: Noisy Layer Data Generation for Efficient and Effective Data-free Knowledge Distillation☆16Oct 19, 2024Updated last year
- Repository that contains the code for the paper titled, 'Unifying Distillation with Personalization in Federated Learning'.☆13May 31, 2021Updated 4 years ago
- PyTorch implementation of "Learning from Students: Online Contrastive Distillation Network for General Continual Learning" (IJCAI 2022)☆11Dec 29, 2022Updated 3 years ago
- Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.☆11Jan 19, 2018Updated 8 years ago