ftramer / Steal-ML
Model extraction attacks on Machine-Learning-as-a-Service platforms.
☆345Updated 4 years ago
Alternatives and similar repositories for Steal-ML:
Users that are interested in Steal-ML are comparing it to the libraries listed below
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆102Updated 5 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Updated last year
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆53Updated 3 years ago
- ☆242Updated 6 years ago
- Trojan Attack on Neural Network☆183Updated 2 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆175Updated 3 years ago
- Countering Adversarial Image using Input Transformations.☆491Updated 3 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆278Updated 4 years ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆85Updated 7 years ago
- Code for Membership Inference Attack against Machine Learning Models (in Oakland 2017)☆193Updated 7 years ago
- A library for running membership inference attacks against ML models☆142Updated 2 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆82Updated last year
- Privacy-preserving generative deep neural networks support clinical data sharing☆104Updated 5 years ago
- A simple and accurate method to fool deep neural networks☆358Updated 4 years ago
- ☆93Updated 4 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆66Updated 6 years ago
- A curated list of awesome resources for adversarial examples in deep learning☆263Updated 4 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆70Updated 6 years ago
- Crafting adversarial images☆223Updated 6 years ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆130Updated 2 years ago
- Game-Theoretic Adversarial Machine Learning Library☆58Updated 6 years ago
- Various material around private machine learning, some associated with blog☆149Updated 5 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆108Updated 7 years ago
- Implementation of "Machine Learning Classification over Encrypted Data" by Raphael Bost, Raluca Ada Popa, Stephen Tu and Shafi Goldwasser☆38Updated 7 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆290Updated 6 months ago
- VizSec17: Web-based visualization tool for adversarial machine learning / LiveDemo☆131Updated last year
- SOON TO BE DEPRECATED - Private machine learning progress☆470Updated 4 years ago
- Robust evasion attacks against neural network to find adversarial examples☆815Updated 3 years ago
- An awesome list of papers on privacy attacks against machine learning☆585Updated 11 months ago
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆351Updated 2 years ago