SonyResearch / IDEALLinks
Query-Efficient Data-Free Learning from Black-Box Models
☆22Updated 2 years ago
Alternatives and similar repositories for IDEAL
Users that are interested in IDEAL are comparing it to the libraries listed below
Sorting:
- Github repo for One-shot Neural Backdoor Erasing via Adversarial Weight Masking (NeurIPS 2022)☆15Updated 2 years ago
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆36Updated 8 months ago
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆33Updated 2 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆35Updated 2 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 2 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆26Updated 7 months ago
- Official Repository for ResSFL (accepted by CVPR '22)☆21Updated 3 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆50Updated 2 years ago
- SEAT☆20Updated last year
- Knowledge distillation (KD) from a decision-based black-box (DB3) teacher without training data.☆21Updated 3 years ago
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Updated 9 months ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆48Updated last year
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆30Updated 3 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 2 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆25Updated 4 years ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated 2 years ago
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆22Updated last year
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Updated 2 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 2 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆30Updated 2 months ago
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆23Updated 2 months ago
- ☆58Updated last year
- [NeurIPS23 (Spotlight)] "Model Sparsity Can Simplify Machine Unlearning" by Jinghan Jia*, Jiancheng Liu*, Parikshit Ram, Yuguang Yao, Gao…☆71Updated last year
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆37Updated 9 months ago
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Updated 3 months ago
- Camouflage poisoning via machine unlearning☆17Updated last week
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆29Updated 3 years ago
- Backdoor Cleansing with Unlabeled Data (CVPR 2023)☆13Updated 2 years ago
- ☆19Updated 9 months ago
- ☆58Updated 2 years ago