Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature
☆30Sep 25, 2024Updated last year
Alternatives and similar repositories for ModelExtractionPapers
Users that are interested in ModelExtractionPapers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Copycat CNN☆28Apr 17, 2024Updated last year
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆115Dec 8, 2022Updated 3 years ago
- ☆47Mar 29, 2022Updated 4 years ago
- Privacy backdoors☆50Apr 28, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Code for the AAAI 2024 paper: "AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack" (accepted).☆12Mar 28, 2024Updated 2 years ago
- Deep learning based automatic modulation classification for sub-carriers of OFDM signals.☆12Jan 3, 2024Updated 2 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- CLearning is a general continual learning framework☆14Jan 31, 2025Updated last year
- This is the official repository for "DiffSG: A Generative Solver for Network Optimization with Diffusion Model" and "Diffusion Models as …☆20Feb 10, 2025Updated last year
- Official Implementation of ICML'23 "Byzantine-Robust Learning on Heterogeneous Data via Gradient Splitting".☆15Jun 9, 2023Updated 2 years ago
- This is an official pytorch implementation for paper "Learning Soft Sparse Shapes for Efficient Time-Series Classification" (ICML-25, Spo…☆20Jun 9, 2025Updated 10 months ago
- Defending AI-Based Automatic Modulation Recognition Models Against Adversarial Attacks☆11Jan 11, 2025Updated last year
- The code of paper: Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing (CVPR 2024))☆19Mar 12, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Some backbone networks commonly used in AMR (Pytorch Version)☆14Jun 3, 2025Updated 10 months ago
- ☆22Jul 20, 2022Updated 3 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 8 months ago
- In this project, we have developed a basic CNN model which is used for "Automatic Modulation Classification" using constellation diagrams…☆17Jun 29, 2024Updated last year
- Dual Swin Transformer for video-time-series fusion☆19Aug 28, 2024Updated last year
- Code containing various models for automatic modulation classification (AMC).☆18Oct 5, 2024Updated last year
- This repository compiles a list of papers related to intellectual property (IP) protection for deep learning models.☆17Feb 18, 2025Updated last year
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Python library for Adversarial ML Evaluation☆26Jul 14, 2025Updated 8 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Official code for "EMC²-Net: Joint Equalization and Modulation Classification based on Constellation Network", ICASSP 2023.☆17May 30, 2023Updated 2 years ago
- ☆10Mar 31, 2016Updated 10 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆35Mar 29, 2023Updated 3 years ago
- ☆372Updated this week
- reproduce the FLTrust model based on the paper "FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping"☆35Dec 4, 2022Updated 3 years ago
- ☆34Mar 28, 2022Updated 4 years ago
- Knowledge distillation (KD) from a decision-based black-box (DB3) teacher without training data.☆22May 3, 2022Updated 3 years ago
- Code for "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples" (NDSS 2020)☆22Nov 14, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- ☆38Feb 7, 2024Updated 2 years ago
- Histopatholical visualization toolkit based on OpenSeaDragon.☆30Updated this week
- Prototype compiler from AWS CloudFormation IaC templates into Logic.☆13Dec 5, 2023Updated 2 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- ☆21Jun 6, 2024Updated last year