Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature
☆31Sep 25, 2024Updated last year
Alternatives and similar repositories for ModelExtractionPapers
Users that are interested in ModelExtractionPapers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Copycat CNN☆28Apr 17, 2024Updated 2 years ago
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆34Jun 24, 2025Updated 10 months ago
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆21Jul 30, 2024Updated last year
- ☆47Mar 29, 2022Updated 4 years ago
- ☆23Jun 14, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Start from Interpret Neural Networks by Identifying Critical Data Routing Paths☆14Jan 24, 2019Updated 7 years ago
- Custom Leaflet TileLayer using WebGL to colorize pixels according to a specified color scale☆13Dec 30, 2022Updated 3 years ago
- Code for the AAAI 2024 paper: "AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack" (accepted).☆12Mar 28, 2024Updated 2 years ago
- Official Repository for "Ten Words Only Still Help: Improving Black-Box AI-Generated Text Detection via Proxy-Guided Efficient Re-Samplin…☆23Aug 15, 2024Updated last year
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Nov 4, 2020Updated 5 years ago
- CLearning is a general continual learning framework☆14Jan 31, 2025Updated last year
- PyTorch implementation of RRD: https://arxiv.org/abs/2407.12073☆15Dec 2, 2025Updated 5 months ago
- ☆31Jun 12, 2025Updated 11 months ago
- ☆11Jun 16, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is an official pytorch implementation for paper "Learning Soft Sparse Shapes for Efficient Time-Series Classification" (ICML-25, Spo…☆20Jun 9, 2025Updated 11 months ago
- ☆12Sep 14, 2023Updated 2 years ago
- Role-Wise Data Augmentation for Knowledge Distillation☆19Nov 22, 2022Updated 3 years ago
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 8 months ago
- The code of paper: Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing (CVPR 2024))☆19Mar 12, 2024Updated 2 years ago
- ☆22Jul 20, 2022Updated 3 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 9 months ago
- This project explores training data extraction attacks on the LLaMa 7B, GPT-2XL, and GPT-2-IMDB models to discover memorized content usin…☆15Jun 15, 2023Updated 2 years ago
- An open framework for automatic modulation classification.☆15May 22, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- 本研究基于孪生网络和N-way K-shot学习策略,创新提出了一种结合transformer的心电信号分类架构,命名为SMC-Net(Siamese Meta-learning Contrastive Neural Network)。该模型通过孪生网络的结构特性和元学习的…☆18Jun 1, 2024Updated last year
- Code containing various models for automatic modulation classification (AMC).☆18Oct 5, 2024Updated last year
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆25Dec 6, 2023Updated 2 years ago
- Official code for "EMC²-Net: Joint Equalization and Modulation Classification based on Constellation Network", ICASSP 2023.☆17May 30, 2023Updated 2 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆35Mar 29, 2023Updated 3 years ago
- reproduce the FLTrust model based on the paper "FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping"☆36Dec 4, 2022Updated 3 years ago
- Knowledge distillation (KD) from a decision-based black-box (DB3) teacher without training data.☆22May 3, 2022Updated 4 years ago
- ☆57Mar 16, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Code for Active Mixup in 2020 CVPR☆23Jan 11, 2022Updated 4 years ago
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- The official code for ICML 2024 "FedREDefense: Defending against Model Poisoning Attacks for Federated Learning using Model Update Recons…☆31Jun 6, 2024Updated last year
- ☆38Feb 7, 2024Updated 2 years ago
- Prototype compiler from AWS CloudFormation IaC templates into Logic.☆13Dec 5, 2023Updated 2 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- ☆21Jun 6, 2024Updated last year