Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature
☆30Sep 25, 2024Updated last year
Alternatives and similar repositories for ModelExtractionPapers
Users that are interested in ModelExtractionPapers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Copycat CNN☆28Apr 17, 2024Updated last year
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆114Dec 8, 2022Updated 3 years ago
- ☆47Mar 29, 2022Updated 3 years ago
- Start from Interpret Neural Networks by Identifying Critical Data Routing Paths☆14Jan 24, 2019Updated 7 years ago
- Deep learning based automatic modulation classification for sub-carriers of OFDM signals.☆12Jan 3, 2024Updated 2 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- CLearning is a general continual learning framework☆13Jan 31, 2025Updated last year
- ☆31Jun 12, 2025Updated 9 months ago
- This work home of the PO-233 discipline at ITA shows how to use a machine learning for digital modulation classification.☆12Jun 30, 2020Updated 5 years ago
- This is the official repository for "DiffSG: A Generative Solver for Network Optimization with Diffusion Model" and "Diffusion Models as …☆19Feb 10, 2025Updated last year
- Official Implementation of ICML'23 "Byzantine-Robust Learning on Heterogeneous Data via Gradient Splitting".☆15Jun 9, 2023Updated 2 years ago
- [ACM MM 2025] DFBench: Benchmarking Deepfake Image Detection Capability of Large Multimodal Models☆23Aug 6, 2025Updated 7 months ago
- Defending AI-Based Automatic Modulation Recognition Models Against Adversarial Attacks☆12Jan 11, 2025Updated last year
- ☆11Jun 16, 2020Updated 5 years ago
- ☆12Sep 14, 2023Updated 2 years ago
- 自动调制识别(AMR)☆19Nov 16, 2023Updated 2 years ago
- Role-Wise Data Augmentation for Knowledge Distillation☆19Nov 22, 2022Updated 3 years ago
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 6 months ago
- The code of paper: Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing (CVPR 2024))☆19Mar 12, 2024Updated 2 years ago
- ☆25Jan 21, 2022Updated 4 years ago
- Some backbone networks commonly used in AMR (Pytorch Version)☆14Jun 3, 2025Updated 9 months ago
- [ICML 2023] "On Strengthening and Defending Graph Reconstruction Attack with Markov Chain Approximation"☆33Nov 10, 2023Updated 2 years ago
- Advanced Vehicle Dynamics Control☆10Jun 12, 2017Updated 8 years ago
- In this project, we have developed a basic CNN model which is used for "Automatic Modulation Classification" using constellation diagrams…☆17Jun 29, 2024Updated last year
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- This project explores training data extraction attacks on the LLaMa 7B, GPT-2XL, and GPT-2-IMDB models to discover memorized content usin…☆15Jun 15, 2023Updated 2 years ago
- ☆15Sep 29, 2024Updated last year
- An open framework for automatic modulation classification.☆15May 22, 2024Updated last year
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- 本研究基于孪生网络和N-way K-shot学习策略,创新提出了一种结合transformer的心电信号分类架构,命名为SMC-Net(Siamese Meta-learning Contrastive Neural Network)。该模型通过孪生网络的结构特性和元学习的…☆18Jun 1, 2024Updated last year
- Code containing various models for automatic modulation classification (AMC).☆18Oct 5, 2024Updated last year
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆22Dec 6, 2023Updated 2 years ago
- Python library for Adversarial ML Evaluation☆26Jul 14, 2025Updated 8 months ago
- Official code for "EMC²-Net: Joint Equalization and Modulation Classification based on Constellation Network", ICASSP 2023.☆17May 30, 2023Updated 2 years ago
- Self deleting bash script securely deletes using Shred☆14May 28, 2022Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆35Mar 29, 2023Updated 2 years ago
- ☆371Jan 4, 2026Updated 2 months ago