Copycat CNN
☆28Apr 17, 2024Updated last year
Alternatives and similar repositories for Stealing_DL_Models
Users that are interested in Stealing_DL_Models are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Black-Box Ripper: Copying black-box models using generative evolutionary algorithms - NIPS 2020 - Official Implementation☆29Oct 25, 2020Updated 5 years ago
- ☆13Jul 11, 2019Updated 6 years ago
- ☆10Jun 5, 2021Updated 4 years ago
- ☆54Mar 16, 2021Updated 5 years ago
- CME: Concept-based Model Extraction☆13Nov 24, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature☆30Sep 25, 2024Updated last year
- A novel data-free model stealing method based on GAN☆133Oct 11, 2022Updated 3 years ago
- 📄 [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools☆14May 23, 2023Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Privacy Testing for Deep Learning☆211Sep 5, 2025Updated 6 months ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- Towards Reverse-Engineering Black-Box Neural Networks, ICLR'18☆55Jun 7, 2019Updated 6 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆37Jan 28, 2019Updated 7 years ago
- Data-enriching GAN for retrieving Representative Samples from aTrained Classifier☆14Sep 2, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Deep learning based automatic modulation classification for sub-carriers of OFDM signals.☆12Jan 3, 2024Updated 2 years ago
- A self-made 4-axis robotic arm☆12Jan 16, 2022Updated 4 years ago
- An awesome list of papers on privacy attacks against machine learning☆633Mar 18, 2024Updated 2 years ago
- Code release for DeepJudge (S&P'22)☆52Mar 14, 2023Updated 3 years ago
- CLearning is a general continual learning framework☆14Jan 31, 2025Updated last year
- [arXiv 2024] PyTorch implementation of RRD: https://arxiv.org/abs/2407.12073☆15Dec 2, 2025Updated 3 months ago
- This repository holds the results of a project on Remaining Useful Lifetime estimation of a turbofan engine for a course of Delft Univers…☆13Jan 18, 2018Updated 8 years ago
- ☆31Jun 12, 2025Updated 9 months ago
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Oct 15, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆23Sep 21, 2022Updated 3 years ago
- Public implementation of ICML'19 paper "White-box vs Black-box: Bayes Optimal Strategies for Membership Inference"☆18May 28, 2020Updated 5 years ago
- ☆11Jun 16, 2020Updated 5 years ago
- A project to design, implement and demonstrate an algorithm to find the shortest path, from a source to a destination point, avoiding a n…☆12Jan 24, 2017Updated 9 years ago
- ☆12Sep 14, 2023Updated 2 years ago
- 自动调制识别(AMR)☆19Nov 16, 2023Updated 2 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- Code for "Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment" (CCS 2019)☆49Dec 17, 2019Updated 6 years ago
- Based on Pytorch, the Adversarial Attack algorithm DeepFool, targeting the Mnist data set and ResNet18 network☆16Jul 28, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A PyTorch Implementation of YOLOv3☆14Apr 16, 2019Updated 6 years ago
- Role-Wise Data Augmentation for Knowledge Distillation☆19Nov 22, 2022Updated 3 years ago
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 6 months ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- Some backbone networks commonly used in AMR (Pytorch Version)☆14Jun 3, 2025Updated 9 months ago
- [TMLR 2024] On the Adversarial Robustness of Camera-based 3D Object Detection☆31Apr 23, 2024Updated last year