This is a comprehensive resource repository for deep learning model inversion attacks and defenses research.
☆28Nov 13, 2025Updated 4 months ago
Alternatives and similar repositories for Deep-Learning-Model-Inversion-Attacks-and-Defenses
Users that are interested in Deep-Learning-Model-Inversion-Attacks-and-Defenses are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ECCV-2024 oral] Source code for our paper "A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion At…☆25Sep 22, 2024Updated last year
- [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆217May 30, 2025Updated 9 months ago
- ☆11Jul 30, 2025Updated 7 months ago
- Dataset Quantization with Active Learning based Adaptive Sampling [ECCV 2024]☆10Jul 9, 2024Updated last year
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆46Jul 18, 2025Updated 8 months ago
- ☆20Oct 28, 2025Updated 4 months ago
- [ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.☆52Jul 13, 2024Updated last year
- ☆10Jan 7, 2026Updated 2 months ago
- ☆10Sep 30, 2024Updated last year
- ☆23Apr 24, 2025Updated 10 months ago
- A PyTorch based repository for Federate Learning with Differential Privacy☆17Mar 3, 2023Updated 3 years ago
- ☆11Dec 18, 2024Updated last year
- A Fine-grained Differentially Private Federated Learning against Leakage from Gradients☆15Jan 18, 2023Updated 3 years ago
- [CVPR 2023] Adversarial Robustness via Random Projection Filters☆13Jun 20, 2023Updated 2 years ago
- CaptionQA: Is Your Caption as Useful as the Image Itself?☆35Mar 3, 2026Updated 2 weeks ago
- [CVPR 2025] Six-CD: Benchmarking Concept Removals for Benign Text-to-image Diffusion Models☆16Jan 8, 2026Updated 2 months ago
- Contains implementation of denoising algorithms.☆11Jul 16, 2020Updated 5 years ago
- ☆16Jul 23, 2022Updated 3 years ago
- [AAAI 2025] Label-Free Backdoor Attacks in Vertical Federated Learning☆20Apr 14, 2025Updated 11 months ago
- Cross-modal Clustering with Deep Correlated Information Bottleneck Method☆10Aug 7, 2022Updated 3 years ago
- Pytorch Implementation of CLIP-Lite | Accepted at AISTATS 2023☆14Mar 17, 2023Updated 3 years ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆192Sep 23, 2025Updated 6 months ago
- [AAAI 2023] Scalable Attributed-Graph Subspace Clustering☆12Jul 16, 2023Updated 2 years ago
- ☆15Jan 26, 2025Updated last year
- ☆23Dec 15, 2022Updated 3 years ago
- Composite Backdoor Attacks Against Large Language Models☆23Apr 12, 2024Updated last year
- 该项目实现了隐私保护和可验证的卷积神经网络(CNN)测试,旨在使模型开发者能够在多个测试者提供的非公开数据上向用户证明CNN性能的真 实性,同时保护模型和数据的隐私。☆17Oct 23, 2023Updated 2 years ago
- Least Squares Regression for subspace clustering☆10May 27, 2018Updated 7 years ago
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆24Sep 11, 2025Updated 6 months ago
- ☆22Sep 16, 2022Updated 3 years ago
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- PyTorch implementation of PTQ4DiT https://arxiv.org/abs/2405.16005☆45Nov 8, 2024Updated last year
- ☆16Nov 2, 2020Updated 5 years ago
- a unified reinforcement learning toolbox for joint RL on language models and diffusion models☆75Feb 7, 2026Updated last month
- A collection of multi-view datasets☆12Mar 22, 2022Updated 4 years ago
- Replication in Visual Diffusion Models: A Survey and Outlook☆31Aug 2, 2024Updated last year
- Code for paper "One Pass Late Fusion Multi-view Clustering" (ICML 2021)☆16Jul 30, 2021Updated 4 years ago
- ☆31Dec 8, 2025Updated 3 months ago
- ☆23Aug 24, 2020Updated 5 years ago