[RecSys 2021] PyTorch Implementation of Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction
☆40Sep 6, 2021Updated 4 years ago
Alternatives and similar repositories for RecSys-Extraction-Attack
Users that are interested in RecSys-Extraction-Attack are comparing it to the libraries listed below
Sorting:
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- Code and data for the ACM CIKM 2024 paper "Adversarial Text Rewriting for Text-aware Recommender Systems"☆12Aug 1, 2024Updated last year
- ☆12Dec 9, 2020Updated 5 years ago
- A unified framework for recommender system attacking☆33Mar 29, 2024Updated last year
- Model Poisoning Attack to Federated Recommendation☆32Apr 23, 2022Updated 3 years ago
- ☆20Oct 28, 2025Updated 4 months ago
- FairGAN: GANs-based Fairness-aware Learning for Recommendations with Implicit Feedback☆15Oct 8, 2022Updated 3 years ago
- ☆35Dec 3, 2020Updated 5 years ago
- [EMNLP 2021] PyTorch Implementation of Contrastive Domain Adaptation for Question Answering using Limited Text Corpora☆14Jul 4, 2023Updated 2 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 4 years ago
- This is the repository for our paper "GAN-based Matrix Factorization for Recommender Systems" accepted at ACM/SIGAPP Symposium on Applied…☆18Aug 22, 2022Updated 3 years ago
- Official Code for ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users (NeurIPS 2024)☆23Oct 23, 2024Updated last year
- [ NeurIPS '22 ] Data distillation for recommender systems. Shows equivalent performance with 2-3 orders less data.☆23Jun 8, 2023Updated 2 years ago
- An open-source framework for conducting data poisoning attacks on recommendation systems, designed to assist researchers and practitioner…☆121Apr 8, 2025Updated 10 months ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆20Aug 15, 2022Updated 3 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- ☆22Sep 17, 2024Updated last year
- ☆49Oct 14, 2023Updated 2 years ago
- ☆83Aug 3, 2021Updated 4 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- PyTorch impelementation for "Federated Recommendation via Hybrid Retrieval Augmented Generation".☆23Mar 8, 2024Updated last year
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆28Mar 24, 2025Updated 11 months ago
- ☆22Aug 15, 2022Updated 3 years ago
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆27Aug 21, 2023Updated 2 years ago
- This repository contains the official code for the paper: "Prompt Injection: Parameterization of Fixed Inputs"☆32Sep 13, 2024Updated last year
- Graph Trend Filtering Networks for Recommendations, SIGIR'2022☆27Apr 5, 2022Updated 3 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆114Dec 8, 2022Updated 3 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- A Survey of Poisoning Attacks and Defenses in Recommender Systems☆40Oct 17, 2025Updated 4 months ago
- A curated collection of adversarial attack and defense on recommender systems.☆136Apr 29, 2022Updated 3 years ago
- [WWW'23] PyTorch implementation for "Learning Vector-Quantized Item Representation for Transferable Sequential Recommenders".☆93Mar 27, 2023Updated 2 years ago
- Data poisoning attack of recommend system using the algorithm of MF.☆31Apr 10, 2018Updated 7 years ago
- ☆44Apr 25, 2023Updated 2 years ago
- Implementation of SVD and SVD++ for recommendation☆32Jan 13, 2017Updated 9 years ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year