ffhibnese / GIFD_Gradient_Inversion_Attack
[ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.
☆38Updated 9 months ago
Alternatives and similar repositories for GIFD_Gradient_Inversion_Attack:
Users that are interested in GIFD_Gradient_Inversion_Attack are comparing it to the libraries listed below
- [ECCV-2024 oral] Source code for our paper "A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion At…☆20Updated 6 months ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆28Updated 6 months ago
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆24Updated last week
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆48Updated last year
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆169Updated 3 weeks ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated last year
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆20Updated last year
- ☆69Updated 8 months ago
- A curated list of papers for the transferability of adversarial examples☆63Updated 9 months ago
- ☆27Updated last year
- ☆42Updated last year
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆17Updated 3 weeks ago
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆28Updated last month
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆42Updated 8 months ago
- [ICLR 2024] Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images☆33Updated last year
- [ICLR2024] "Backdoor Federated Learning by Poisoning Backdoor-Critical Layers"☆33Updated 4 months ago
- ☆32Updated 6 months ago
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆17Updated 5 months ago
- ☆12Updated 9 months ago
- ☆19Updated 2 years ago
- A collection of resources on attacks and defenses targeting text-to-image diffusion models☆64Updated 3 weeks ago
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning☆15Updated last year
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆89Updated 7 months ago
- ☆25Updated last year
- [CVPR23W] "A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion" by Haomin Zhuang, Yihua Zhang and Sijia Liu☆26Updated 7 months ago
- ☆12Updated last week
- ☆21Updated 7 months ago
- ☆11Updated last week
- Code for Backdoor Attacks Against Dataset Distillation☆34Updated last year
- Universal Adversarial Attack, Multimodal Adversarial Attacks, VLP models, Contrastive Learning, Cross-modal Perturbation Generator, Gener…☆16Updated 6 months ago