Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)
☆14Nov 8, 2024Updated last year
Alternatives and similar repositories for mia_attacks
Users that are interested in mia_attacks are comparing it to the libraries listed below
Sorting:
- An unofficial pyotrch implementation of "ML-Leaks:Model and Data Independent Membership Inference Attacks and Defenses on ML Models"☆11Dec 23, 2023Updated 2 years ago
- ☆15Apr 4, 2024Updated last year
- ☆25Nov 14, 2022Updated 3 years ago
- Likelihood Ratio Attack (LiRA) in PyTorch☆17Mar 3, 2025Updated last year
- FederBoost's Federated Gradient Boosting Decision Tree Algorithm, Federated enabled Membership Inference☆16Dec 13, 2023Updated 2 years ago
- 🔒 Implementation of Shokri et al(2016) "Membership Inference Attacks against Machine Learning Models"☆34Aug 29, 2022Updated 3 years ago
- Public implementation of the paper "On the Importance of Difficulty Calibration in Membership Inference Attacks".☆16Dec 1, 2021Updated 4 years ago
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆133Apr 9, 2024Updated last year
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆48Aug 18, 2022Updated 3 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Jul 12, 2022Updated 3 years ago
- ☆25Jan 20, 2019Updated 7 years ago
- ☆32Sep 2, 2024Updated last year
- ☆17Feb 6, 2024Updated 2 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- ☆21Feb 25, 2026Updated last week
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- BBO optimiser☆11Feb 11, 2020Updated 6 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- Code for "Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders" at ICML 2024☆10Sep 18, 2025Updated 5 months ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Causal Reasoning for Membership Inference Attacks☆11Oct 21, 2022Updated 3 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- ☆10Nov 8, 2021Updated 4 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- ☆11Dec 22, 2021Updated 4 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- ☆10Jun 2, 2021Updated 4 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- ☆10May 14, 2023Updated 2 years ago
- ☆10Jun 24, 2021Updated 4 years ago
- Audio-only Emotion Detection using Federated Learning☆10Dec 8, 2022Updated 3 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- ☆10Dec 26, 2023Updated 2 years ago
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago