☆27Sep 23, 2022Updated 3 years ago
Alternatives and similar repositories for Label-Only-Model-Inversion-Attacks-via-Boundary-Repulsion
Users that are interested in Label-Only-Model-Inversion-Attacks-via-Boundary-Repulsion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Dec 10, 2021Updated 4 years ago
- ☆46Sep 24, 2023Updated 2 years ago
- This is a PyTorch implementation of the paper "Reinforcement Learning-Based Black-Box Model Inversion Attacks" accepted by CVPR 2023.☆40May 4, 2023Updated 3 years ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆32Oct 15, 2024Updated last year
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆48Jul 18, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for NDSS 2022 paper "MIRROR: Model Inversion for Deep Learning Network with High Fidelity"☆27May 9, 2023Updated 2 years ago
- [CVPR-2023] Re-thinking Model Inversion Attacks Against Deep Neural Networks☆43Nov 12, 2023Updated 2 years ago
- ☆13Apr 13, 2025Updated last year
- [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆221Apr 3, 2026Updated last month
- Training-free data valuation on deep neural network applications. (ICML-2022)☆27Jul 13, 2022Updated 3 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆45Jan 18, 2022Updated 4 years ago
- Fine-tuning-free Shapley value (FreeShap) for instance attribution☆14May 29, 2024Updated last year
- Vue + SpringBoot + RocketMQ + Redis 智能AI视频解析平台。用户可通过 本地视频 或 在线链接 ,一键提取音频,文字,AI总结概括。涉及消息队列异步化、分布式锁防并发、分片上传与断点续传等等☆73Mar 21, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆84Feb 26, 2023Updated 3 years ago
- ☆10Jun 5, 2021Updated 4 years ago
- Official Repository for ResSFL (accepted by CVPR '22)☆26Jun 24, 2022Updated 3 years ago
- ☆17Mar 23, 2025Updated last year
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Oct 1, 2022Updated 3 years ago
- ☆13Sep 26, 2024Updated last year
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- This is an official repository for "Performance Scaling via Optimal Transport: Enabling Data Selection from Partially Revealed Sources" (…☆14Oct 26, 2023Updated 2 years ago
- ☆13Apr 12, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The code of the paper "Minimizing the Accumulated Trajectory Error to Improve Dataset Distillation" (CVPR2023)☆18Mar 21, 2023Updated 3 years ago
- A fast and efficient way to compute a differentiable bound on the singular values of convolution layers☆12Nov 22, 2019Updated 6 years ago
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆25Dec 6, 2023Updated 2 years ago
- [ICML 2024] Sparse Model Inversion: Efficient Inversion of Vision Transformers with Less Hallucination☆14Apr 29, 2025Updated last year
- Data Valuation without Training of a Model, submitted to ICLR'23☆22Dec 30, 2022Updated 3 years ago
- Membership Inference Attack against Graph Neural Networks☆12Nov 9, 2022Updated 3 years ago
- Official PyTorch implementation of CVPR2022 paper “Learning to Imagine: Diversify Memory for Incremental Learning using Unlabeled Data”☆13Jul 25, 2022Updated 3 years ago
- ☆18Oct 7, 2022Updated 3 years ago
- System-on-chip design for NOP in NSCSCC 2023.☆13Aug 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 1.0☆13Jun 7, 2025Updated 10 months ago
- [NeurIPS'22] Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork. Haotao Wang, Junyuan Hong,…☆14Nov 27, 2023Updated 2 years ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆193Sep 23, 2025Updated 7 months ago
- [NeurIPS 2024] Source code for our paper "Finding NeMo: Localizing Neurons Responsible For Memorization in Diffusion Models".☆13Jul 18, 2025Updated 9 months ago
- Regression analysis using python and scikit learn - Communities and Crime Data Set (UCI).☆10Jul 14, 2018Updated 7 years ago
- ☆22Sep 17, 2024Updated last year
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago