ftramer / Steal-MLLinks
Model extraction attacks on Machine-Learning-as-a-Service platforms.
☆350Updated 4 years ago
Alternatives and similar repositories for Steal-ML
Users that are interested in Steal-ML are comparing it to the libraries listed below
Sorting:
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 5 years ago
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆53Updated 4 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆187Updated 2 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆179Updated 3 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆85Updated 2 years ago
- Trojan Attack on Neural Network☆184Updated 3 years ago
- A library for running membership inference attacks against ML models☆147Updated 2 years ago
- Countering Adversarial Image using Input Transformations.☆497Updated 3 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆288Updated 5 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆122Updated 2 years ago
- ☆97Updated 4 years ago
- A certifiable defense against adversarial examples by training neural networks to be provably robust☆220Updated 10 months ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆86Updated 7 years ago
- ☆245Updated 6 years ago
- Privacy Meter: An open-source library to audit data privacy in statistical and machine learning algorithms.☆651Updated last month
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆135Updated 2 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆67Updated 7 years ago
- A curated list of awesome resources for adversarial examples in deep learning☆264Updated 4 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆99Updated 6 years ago
- Code for Membership Inference Attack against Machine Learning Models (in Oakland 2017)☆194Updated 7 years ago
- A simple and accurate method to fool deep neural networks☆364Updated 5 years ago
- ☆144Updated 7 months ago
- An awesome list of papers on privacy attacks against machine learning☆608Updated last year
- A library for performing coverage guided fuzzing of neural networks☆209Updated 6 years ago
- Privacy Testing for Deep Learning☆205Updated last year
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆126Updated last year
- Privacy-preserving generative deep neural networks support clinical data sharing☆105Updated 6 years ago
- VizSec17: Web-based visualization tool for adversarial machine learning / LiveDemo☆130Updated 2 years ago
- Crafting adversarial images☆223Updated 6 years ago
- Dataflow analysis & differential privacy for SQL queries. This project is deprecated and not maintained.☆399Updated 5 years ago