casrl / DeepSteal-exploit
Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel
☆10Updated last year
Alternatives and similar repositories for DeepSteal-exploit
Users that are interested in DeepSteal-exploit are comparing it to the libraries listed below
Sorting:
- ☆32Updated last month
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆35Updated last year
- ☆26Updated last year
- ☆24Updated 3 years ago
- ☆66Updated 4 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆10Updated 2 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆32Updated 4 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆19Updated 4 years ago
- ☆25Updated 5 years ago
- This is a python script to generate nice bibtex file for latex.☆15Updated 5 years ago
- Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature Attribution…☆9Updated 8 months ago
- ☆25Updated 2 years ago
- Pytorch implementation of Bit-Flip based adversarial weight Attack (BFA)☆32Updated 3 years ago
- ☆25Updated 10 months ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆15Updated 3 years ago
- ☆18Updated 3 years ago
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆18Updated 3 years ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆19Updated 2 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Updated 3 weeks ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Updated 6 years ago
- Implementation of https://github.com/PurduePAML/TrojanNN☆9Updated 6 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- Papers I have collected and read in undergraduate and graduate period☆51Updated last year
- Craft poisoned data using MetaPoison☆51Updated 4 years ago
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆22Updated last year
- Code for ML Doctor☆87Updated 9 months ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- A paper summary of Backdoor Attack against Neural Network☆13Updated 5 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆27Updated 3 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Updated 4 years ago