Black-Box Ripper: Copying black-box models using generative evolutionary algorithms - NIPS 2020 - Official Implementation
☆29Oct 25, 2020Updated 5 years ago
Alternatives and similar repositories for black-box-ripper
Users that are interested in black-box-ripper are comparing it to the libraries listed below
Sorting:
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆76Apr 1, 2024Updated last year
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Nov 4, 2020Updated 5 years ago
- ☆19Dec 4, 2021Updated 4 years ago
- ☆17Dec 12, 2020Updated 5 years ago
- Code for "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples" (NDSS 2020)☆22Nov 14, 2020Updated 5 years ago
- Knowledge distillation (KD) from a decision-based black-box (DB3) teacher without training data.☆22May 3, 2022Updated 3 years ago
- Open source demo for the paper Learning to Score Behaviors for Guided Policy Optimization☆24Jun 24, 2020Updated 5 years ago
- An awesome list of papers on privacy attacks against machine learning☆634Mar 18, 2024Updated last year
- Easily build an economic environment on PocketMine☆12Jan 24, 2017Updated 9 years ago
- A Julia package for consensus-based optimisation☆16Nov 28, 2025Updated 3 months ago
- Model extraction attacks on Machine-Learning-as-a-Service platforms.☆356Nov 22, 2020Updated 5 years ago
- A benchmark library for Dynamic Algorithm Configuration.☆34Feb 23, 2026Updated 2 weeks ago
- A tiny JavaScript utility that corrects miswritten Hangeul sentences like gksdud☆38Aug 2, 2025Updated 7 months ago
- ☆34Mar 28, 2022Updated 3 years ago
- [IJCAI-2021] Contrastive Model Inversion for Data-Free Knowledge Distillation☆74Apr 7, 2022Updated 3 years ago
- ☆12Feb 23, 2026Updated 2 weeks ago
- ☆19Feb 18, 2024Updated 2 years ago
- ☆10Feb 27, 2026Updated last week
- ☆12Jul 25, 2018Updated 7 years ago
- ☆36Aug 30, 2019Updated 6 years ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- VEEGAN: Reducing Mode Collapse in GANs using Implicit Variational Learning☆40Feb 2, 2019Updated 7 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- ☆13Oct 11, 2024Updated last year
- Attacks against proposed image encryption schemes☆10Apr 27, 2020Updated 5 years ago
- ☆10Jul 5, 2019Updated 6 years ago
- Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.☆11Jan 19, 2018Updated 8 years ago
- 🦄 Smart contracts for Uniswap protocol fees 🦄☆24Updated this week
- Official implementation of the paper "On the Importance of Environments in Human-Robot Coordination", published in RSS 2021.☆16May 1, 2024Updated last year
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 4 years ago
- 🍛 TypeScript Options-object Currying☆13Dec 9, 2019Updated 6 years ago
- Code for EMNLP'24 paper - On Diversified Preferences of Large Language Model Alignment☆16Aug 6, 2024Updated last year
- ☆11May 9, 2022Updated 3 years ago
- 一个底层基于matrix的自动求导框架,并封装了一个DNN和一个RNN☆10Dec 3, 2020Updated 5 years ago
- Official implementation for "How Should We Meta-Learn Reinforcement Learning Algorithms?"☆23Sep 7, 2025Updated 6 months ago
- ☆12Jan 25, 2026Updated last month
- Unsupervised Learning Korean Kernel Object Analyzer☆13Feb 27, 2019Updated 7 years ago
- ☆10Nov 24, 2021Updated 4 years ago