jinhaoduan / SecMILinks
[ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?
☆36Updated 9 months ago
Alternatives and similar repositories for SecMI
Users that are interested in SecMI are comparing it to the libraries listed below
Sorting:
- Official repo for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization☆14Updated last year
- This is an official repository for Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study (ICCV2023…☆22Updated last year
- ☆44Updated last year
- ☆51Updated 3 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆26Updated 6 months ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 2 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆65Updated 3 years ago
- ☆25Updated 3 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 2 years ago
- Github repo for One-shot Neural Backdoor Erasing via Adversarial Weight Masking (NeurIPS 2022)☆15Updated 2 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆81Updated last year
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆50Updated 2 years ago
- ☆19Updated 8 months ago
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆12Updated last year
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆16Updated last year
- ☆25Updated 2 years ago
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Updated 3 years ago
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆35Updated 7 months ago
- Code for "Label-Consistent Backdoor Attacks"☆57Updated 4 years ago
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆24Updated last month
- Camouflage poisoning via machine unlearning☆17Updated 2 years ago
- ☆19Updated 2 years ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆37Updated last year
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated 2 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 3 years ago
- ☆34Updated last year
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆30Updated 4 years ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆18Updated 2 years ago
- ☆31Updated 3 years ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆42Updated 9 months ago