Code for NDSS 2022 paper "MIRROR: Model Inversion for Deep Learning Network with High Fidelity"
☆27May 9, 2023Updated 2 years ago
Alternatives and similar repositories for mirror
Users that are interested in mirror are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆22Oct 5, 2025Updated 6 months ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Dec 10, 2021Updated 4 years ago
- ☆16Sep 4, 2024Updated last year
- ☆13May 1, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆16Dec 29, 2023Updated 2 years ago
- ☆27Sep 23, 2022Updated 3 years ago
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆38Sep 25, 2023Updated 2 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Apr 5, 2022Updated 4 years ago
- This is a PyTorch implementation of the paper "Reinforcement Learning-Based Black-Box Model Inversion Attacks" accepted by CVPR 2023.☆40May 4, 2023Updated 2 years ago
- Official Implementation of NeurIPS 2024 paper - BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens☆29Feb 17, 2026Updated 2 months ago
- [CVPR-2023] Re-thinking Model Inversion Attacks Against Deep Neural Networks☆43Nov 12, 2023Updated 2 years ago
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated 4 months ago
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Mar 28, 2024Updated 2 years ago
- ☆46Sep 24, 2023Updated 2 years ago
- ☆16May 23, 2024Updated last year
- ☆12May 27, 2022Updated 3 years ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆32Oct 15, 2024Updated last year
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆30Dec 31, 2024Updated last year
- ☆34May 2, 2021Updated 5 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 7 months ago
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆59Dec 11, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Apr 17, 2026Updated 2 weeks ago
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆25Aug 31, 2022Updated 3 years ago
- ☆18Aug 15, 2022Updated 3 years ago
- ☆27Aug 28, 2024Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆55Jun 2, 2025Updated 10 months ago
- [ECCV-2024 oral] Source code for our paper "A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion At…☆24Sep 22, 2024Updated last year
- From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning - CVPR 2025☆16Mar 24, 2025Updated last year
- ☆18Jun 15, 2021Updated 4 years ago
- List of compressed file extensions☆16Apr 30, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Cairo/Skia Benchmark☆11Oct 14, 2014Updated 11 years ago
- Ruby Static Checker☆30Nov 7, 2011Updated 14 years ago
- [NDSS 2025] CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling☆17Jan 18, 2025Updated last year
- pg_linux_stats provides information similar to the Linux commands vmstat, iostat, netstat and mpstat via PostgreSQL.☆16Jan 14, 2025Updated last year
- Code for "Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment" (CCS 2019)☆49Dec 17, 2019Updated 6 years ago
- ☆47Apr 8, 2026Updated 3 weeks ago
- ☆14Dec 1, 2025Updated 5 months ago