This repository contains Python code for the paper "Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning".
☆19Apr 3, 2024Updated last year
Alternatives and similar repositories for Unlearning-inversion-attacks
Users that are interested in Unlearning-inversion-attacks are comparing it to the libraries listed below
Sorting:
- ☆18May 30, 2025Updated 9 months ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- Pytorch implementation of backdoor unlearning.☆21Jun 8, 2022Updated 3 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆24Mar 13, 2022Updated 3 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆57May 4, 2023Updated 2 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- ☆11Dec 23, 2024Updated last year
- This repository contains a visual studio project for training a classifier on the mnist dataset using the libtorch c++ wrapper.☆12Oct 13, 2020Updated 5 years ago
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆43May 18, 2025Updated 9 months ago
- ☆12May 6, 2022Updated 3 years ago
- ☆185Nov 17, 2025Updated 3 months ago
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 10 months ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- ☆17Feb 6, 2024Updated 2 years ago
- Instance-wise Batch Label Restoration via Gradients In Federated Learning (ICLR 2023)☆11May 18, 2023Updated 2 years ago
- ☆11Feb 5, 2024Updated 2 years ago
- ☆14Feb 26, 2025Updated last year
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆13Dec 16, 2024Updated last year
- ☆14Mar 9, 2025Updated 11 months ago
- GPU accelerated Perlin Noise in python☆11Oct 23, 2020Updated 5 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- Code for AISTATS'25 paper - On the Power of Adaptive Weighted Aggregation in Heterogeneous Federated Learning and Beyond☆13Sep 23, 2025Updated 5 months ago
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆38Updated this week
- Implementation of incremental sequential three-way decisions using active learning☆10May 4, 2019Updated 6 years ago
- Implementation of a network for Handwriting Synthesis based on the work of Generating Sequences With Recurrent Neural Networks by Alex Gr…☆11May 12, 2025Updated 9 months ago
- ☆16Oct 9, 2024Updated last year
- [ICLR 2022] Boosting Randomized Smoothing with Variance Reduced Classifiers☆12Mar 29, 2022Updated 3 years ago
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- 用C++实现的简易ECC加密器☆10Jul 10, 2022Updated 3 years ago
- ☆199Sep 22, 2023Updated 2 years ago
- A repository of resources on machine unlearning for diffusion models☆58Oct 9, 2025Updated 4 months ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 3 years ago
- [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆216May 30, 2025Updated 9 months ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆46Jul 18, 2025Updated 7 months ago