ftramer / Steal-ML
Model extraction attacks on Machine-Learning-as-a-Service platforms.
☆347Updated 4 years ago
Alternatives and similar repositories for Steal-ML:
Users that are interested in Steal-ML are comparing it to the libraries listed below
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 5 years ago
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆53Updated 4 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆187Updated 2 years ago
- A library for running membership inference attacks against ML models☆143Updated 2 years ago
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆125Updated last year
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆83Updated 2 years ago
- ☆246Updated 6 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆177Updated 3 years ago
- A simple and accurate method to fool deep neural networks☆363Updated 5 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆67Updated 7 years ago
- A curated list of awesome resources for adversarial examples in deep learning☆265Updated 4 years ago
- ☆94Updated 4 years ago
- Trojan Attack on Neural Network☆183Updated 3 years ago
- Code for Membership Inference Attack against Machine Learning Models (in Oakland 2017)☆193Updated 7 years ago
- Game-Theoretic Adversarial Machine Learning Library☆58Updated 6 years ago
- ☆123Updated 3 years ago
- ☆49Updated 4 years ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆131Updated 2 years ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆85Updated 7 years ago
- ☆64Updated 5 years ago
- Contest Proposal and infrastructure for the Unrestricted Adversarial Examples Challenge☆330Updated 4 years ago
- Crafting adversarial images☆223Updated 6 years ago
- Various material around private machine learning, some associated with blog☆149Updated 5 years ago
- Implementation of "Machine Learning Classification over Encrypted Data" by Raphael Bost, Raluca Ada Popa, Stephen Tu and Shafi Goldwasser☆38Updated 7 years ago
- VizSec17: Web-based visualization tool for adversarial machine learning / LiveDemo☆130Updated last year
- ☆144Updated 6 months ago
- Countering Adversarial Image using Input Transformations.☆496Updated 3 years ago
- Privacy Testing for Deep Learning☆202Updated last year
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆109Updated 7 years ago
- A Privacy Preserving Data Mining Platform☆46Updated 12 years ago