kzhao5 / ModelExtractionPapersLinks
Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature
☆16Updated 11 months ago
Alternatives and similar repositories for ModelExtractionPapers
Users that are interested in ModelExtractionPapers are comparing it to the libraries listed below
Sorting:
- ☆12Updated 2 weeks ago
- ☆32Updated 4 years ago
- ☆46Updated last year
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆218Updated last year
- ☆533Updated 2 months ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆32Updated 4 years ago
- The implementation of the IEEE S&P 2024 paper MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Us…☆13Updated last year
- ☆115Updated 3 months ago
- The paper "Feature Importance-aware Transferable Adversarial Attacks" by pytorch.☆11Updated 6 months ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆130Updated last year
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆269Updated 7 months ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆128Updated 9 months ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆30Updated 3 years ago
- Source code of the paper: "Yes, My LoRD." Guiding Language Model Extraction with Locality Reinforced Distillation. ACL'25☆16Updated 3 months ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆90Updated 2 years ago
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Updated 6 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆57Updated 6 years ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆44Updated last month
- ☆14Updated last year
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆183Updated 5 months ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆97Updated 3 years ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆99Updated 4 years ago
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆30Updated 4 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Updated last year
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆116Updated 2 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Updated 4 years ago
- ☆351Updated 2 months ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆386Updated this week
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆13Updated 4 years ago
- ☆31Updated last year