Towards Reverse-Engineering Black-Box Neural Networks, ICLR'18
☆55Jun 7, 2019Updated 6 years ago
Alternatives and similar repositories for WhitenBlackBox
Users that are interested in WhitenBlackBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code of "Leaky Thoughts: Large Reasoning Models Are Not Private Thinkers" EMNLP 2025☆17Jan 12, 2026Updated 3 months ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆37Jan 28, 2019Updated 7 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆13Sep 6, 2023Updated 2 years ago
- Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective, ICCV'17☆30Sep 15, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SGD with large step sizes learns sparse features [ICML 2023]☆33Apr 24, 2023Updated 2 years ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- ☆11Mar 31, 2022Updated 4 years ago
- Source code for paper Mroueh, Sercu, Rigotti, Padhi, dos Santos, "Sobolev Independence Criterion", NeurIPS 2019☆14Jun 17, 2024Updated last year
- ☆52Aug 28, 2021Updated 4 years ago
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆34Mar 8, 2021Updated 5 years ago
- Copycat CNN☆28Apr 17, 2024Updated 2 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- ☆19Mar 6, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ZOSVRG-BlackBox-Adv☆13Oct 30, 2018Updated 7 years ago
- A public repository for corrupt0 datathon's court data☆11Jul 6, 2019Updated 6 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- ☆25Jan 20, 2019Updated 7 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Graph Datasets with Synthetic Noise Edges☆13May 12, 2020Updated 5 years ago
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Oct 15, 2017Updated 8 years ago
- Mathematical consequences of orthogonal weights initialization and regularization in deep learning. Experiments with gain-adjusted orthog…☆17Sep 21, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆55Mar 16, 2021Updated 5 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆102Nov 2, 2019Updated 6 years ago
- Research Artifact For Our Submission To VLDB☆11Oct 27, 2021Updated 4 years ago
- TextHide: Tackling Data Privacy in Language Understanding Tasks☆30Apr 19, 2021Updated 5 years ago
- ☆10Jun 5, 2021Updated 4 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]☆50Apr 25, 2020Updated 5 years ago
- An awesome list of papers on privacy attacks against machine learning☆633Mar 18, 2024Updated 2 years ago
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Mar 22, 2024Updated 2 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆14Aug 27, 2024Updated last year
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- MACER: MAximizing CErtified Radius (ICLR 2020)☆31Jan 5, 2020Updated 6 years ago
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Jul 15, 2019Updated 6 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago