jeiks / Stealing_DL_Models
Copycat CNN
☆26Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for Stealing_DL_Models
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆29Updated 4 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆94Updated 3 months ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆99Updated 5 years ago
- ☆91Updated 4 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆46Updated 6 years ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆80Updated 3 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆24Updated 3 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆28Updated 4 months ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆113Updated last week
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆123Updated 7 months ago
- A curated list of academic events on AI Security & Privacy☆135Updated 3 months ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆49Updated last week
- ☆23Updated 3 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆69Updated 7 months ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆91Updated 2 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆44Updated 4 years ago
- Code for ML Doctor☆86Updated 3 months ago
- Code for "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples" (NDSS 2020)☆18Updated 4 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆117Updated last year
- ☆140Updated last month
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆20Updated 4 years ago
- ☆44Updated 3 years ago
- ☆62Updated 4 years ago
- Implementations of data poisoning attacks against neural networks and related defenses.☆67Updated 4 months ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆74Updated last year
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆47Updated 2 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆68Updated 6 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆89Updated last year
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆85Updated 3 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆16Updated 4 years ago