ffhibnese / GIFD_Gradient_Inversion_Attack
[ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.
☆34Updated 6 months ago
Alternatives and similar repositories for GIFD_Gradient_Inversion_Attack:
Users that are interested in GIFD_Gradient_Inversion_Attack are comparing it to the libraries listed below
- [ECCV-2024 oral] Source code for our paper "A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion At…☆18Updated 3 months ago
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆24Updated last year
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆25Updated 3 months ago
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆18Updated 9 months ago
- The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consist…☆21Updated last year
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆149Updated 3 weeks ago
- ☆63Updated 5 months ago
- ☆23Updated last year
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆46Updated 9 months ago
- ☆24Updated last year
- Universal Adversarial Attack, Multimodal Adversarial Attacks, VLP models, Contrastive Learning, Cross-modal Perturbation Generator, Gener…☆12Updated 3 months ago
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆25Updated 4 months ago
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆50Updated last year
- A curated list of papers for the transferability of adversarial examples☆58Updated 6 months ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆52Updated last year
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆41Updated 2 months ago
- ☆11Updated 6 months ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆39Updated 5 months ago
- [ECCV-2024] Transferable Targeted Adversarial Attack, CLIP models, Generative adversarial network, Multi-target attacks☆26Updated 5 months ago
- Code for Backdoor Attacks Against Dataset Distillation☆32Updated last year
- ☆24Updated 2 years ago
- ☆18Updated 2 years ago
- [ICLR 2024] Towards Elminating Hard Label Constraints in Gradient Inverision Attacks☆13Updated 11 months ago
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆15Updated last year
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆16Updated last year
- ☆41Updated last year
- ☆20Updated 4 months ago
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆25Updated this week
- Code for our NeurIPS 2023 paper Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly☆14Updated 11 months ago
- Official codes for GRA (Accepted by ICCV2023)☆16Updated last year