antoniobarbalau / black-box-ripperLinks
Black-Box Ripper: Copying black-box models using generative evolutionary algorithms - NIPS 2020 - Official Implementation
☆28Updated 4 years ago
Alternatives and similar repositories for black-box-ripper
Users that are interested in black-box-ripper are comparing it to the libraries listed below
Sorting:
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- ☆23Updated 3 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆32Updated 4 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆44Updated 5 years ago
- ☆31Updated 9 months ago
- PyTorch implementations of Adversarial defenses and utils.☆34Updated last year
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 2 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Updated 2 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆37Updated 6 years ago
- RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)☆56Updated 4 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆73Updated last year
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆55Updated 3 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆39Updated 4 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆50Updated 2 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- MACER: MAximizing CErtified Radius (ICLR 2020)☆30Updated 5 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆40Updated 4 years ago
- [ICLR 2021] "Robust Overfitting may be mitigated by properly learned smoothening" by Tianlong Chen*, Zhenyu Zhang*, Sijia Liu, Shiyu Chan…☆47Updated 3 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆105Updated 10 months ago
- ☆19Updated 9 months ago
- ConvexPolytopePosioning☆35Updated 5 years ago
- ☆25Updated 6 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆72Updated last year
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30Updated 3 years ago
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Updated 3 years ago
- Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approac…☆52Updated 6 years ago
- ☆53Updated 2 years ago
- A unified benchmark problem for data poisoning attacks☆156Updated last year
- ☆66Updated 4 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 2 years ago