Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature
☆30Sep 25, 2024Updated last year
Alternatives and similar repositories for ModelExtractionPapers
Users that are interested in ModelExtractionPapers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆30May 8, 2023Updated 2 years ago
- Copycat CNN☆28Apr 17, 2024Updated 2 years ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- Code for paper "Membership Inference Attacks Against Vision-Language Models"☆29Jan 25, 2025Updated last year
- ☆13Apr 3, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆33Jun 24, 2025Updated 10 months ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆115Dec 8, 2022Updated 3 years ago
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆20Jul 30, 2024Updated last year
- ☆47Mar 29, 2022Updated 4 years ago
- ☆23Jun 14, 2024Updated last year
- Start from Interpret Neural Networks by Identifying Critical Data Routing Paths☆14Jan 24, 2019Updated 7 years ago
- Code for the AAAI 2024 paper: "AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack" (accepted).☆12Mar 28, 2024Updated 2 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Nov 4, 2020Updated 5 years ago
- Deep learning based automatic modulation classification for sub-carriers of OFDM signals.☆12Jan 3, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CLearning is a general continual learning framework☆14Jan 31, 2025Updated last year
- PyTorch implementation of RRD: https://arxiv.org/abs/2407.12073☆15Dec 2, 2025Updated 5 months ago
- ☆31Jun 12, 2025Updated 10 months ago
- A collection of important papers on Generalizable Diffusion-generated Image Detection☆17Mar 20, 2025Updated last year
- This work home of the PO-233 discipline at ITA shows how to use a machine learning for digital modulation classification.☆11Jun 30, 2020Updated 5 years ago
- This is the official repository for "DiffSG: A Generative Solver for Network Optimization with Diffusion Model" and "Diffusion Models as …☆20Feb 10, 2025Updated last year
- ☆30Aug 15, 2025Updated 8 months ago
- ☆17Oct 11, 2021Updated 4 years ago
- 从零构建 AI Agent:LLM 大模型应用开发实践☆44Dec 7, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Some backbone networks commonly used in AMR (Pytorch Version)☆14Apr 13, 2026Updated 2 weeks ago
- [ICML 2023] "On Strengthening and Defending Graph Reconstruction Attack with Markov Chain Approximation"☆34Nov 10, 2023Updated 2 years ago
- ☆22Jul 20, 2022Updated 3 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 9 months ago
- In this project, we have developed a basic CNN model which is used for "Automatic Modulation Classification" using constellation diagrams…☆17Jun 29, 2024Updated last year
- ☆16Sep 29, 2024Updated last year
- ☆11Jan 18, 2022Updated 4 years ago
- This is a comprehensive resource repository for deep learning model inversion attacks and defenses research.☆28Nov 13, 2025Updated 5 months ago
- An open framework for automatic modulation classification.☆15May 22, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- 本研究基于孪生网络和N-way K-shot学习策略,创新提出了一种结合transformer的心电信号分类架构,命名为SMC-Net(Siamese Meta-learning Contrastive Neural Network)。该模型通过孪生网络的结构特性和元学习的…☆18Jun 1, 2024Updated last year
- Code containing various models for automatic modulation classification (AMC).☆18Oct 5, 2024Updated last year
- Malware dev tricks. Syscalls part 1. Simple C example☆11Jun 8, 2023Updated 2 years ago
- Self deleting bash script securely deletes using Shred☆14May 28, 2022Updated 3 years ago
- ☆10Mar 31, 2016Updated 10 years ago
- ☆372Apr 8, 2026Updated 3 weeks ago