This is a comprehensive resource repository for deep learning model inversion attacks and defenses research.
☆28Nov 13, 2025Updated 5 months ago
Alternatives and similar repositories for Deep-Learning-Model-Inversion-Attacks-and-Defenses
Users that are interested in Deep-Learning-Model-Inversion-Attacks-and-Defenses are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ECCV-2024 oral] Source code for our paper "A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion At…☆24Sep 22, 2024Updated last year
- [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆221Apr 3, 2026Updated last month
- Dataset Quantization with Active Learning based Adaptive Sampling [ECCV 2024]☆10Jul 9, 2024Updated last year
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- Official Implementation of paper "Distilling Long-tailed Datasets" [CVPR 2025]☆21Aug 13, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- [ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.☆52Jul 13, 2024Updated last year
- A PyTorch implementation of "Self-Supervised GNN that Jointly Learns to Augment" or "Jointly Learnable Data Augmentations for Self-Superv…☆13Dec 13, 2021Updated 4 years ago
- A PyTorch based repository for Federate Learning with Differential Privacy☆19Mar 3, 2023Updated 3 years ago
- A collection of research materials on explainable generative models☆23Jan 26, 2026Updated 3 months ago
- Contains implementation of denoising algorithms.☆11Jul 16, 2020Updated 5 years ago
- [CVPR 2025] Six-CD: Benchmarking Concept Removals for Benign Text-to-image Diffusion Models☆16Jan 8, 2026Updated 3 months ago
- The official implementation of A Counting-Aware Hierarchical Decoding Framework for Generalized Referring Expression Segmentation☆25Aug 17, 2025Updated 8 months ago
- ☆22Oct 14, 2022Updated 3 years ago
- ☆17Oct 11, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [AAAI 2025] Label-Free Backdoor Attacks in Vertical Federated Learning☆21Apr 14, 2025Updated last year
- TFLlib-Trustworthy Federated Learning Library and Benchmark☆64Mar 24, 2026Updated last month
- Pytorch Implementation of CLIP-Lite | Accepted at AISTATS 2023☆14Mar 17, 2023Updated 3 years ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆193Sep 23, 2025Updated 7 months ago
- ☆23Dec 15, 2022Updated 3 years ago
- Composite Backdoor Attacks Against Large Language Models☆25Apr 12, 2024Updated 2 years ago
- 该项目实现了隐私保护和可验证的卷积神经网络(CNN)测试,旨在使模型开发者能够在多个测试者提供的非公开数据上向用户证明CNN性能的真实性,同时保护模型和数据的隐私。☆17Oct 23, 2023Updated 2 years ago
- Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature☆30Sep 25, 2024Updated last year
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆24Sep 11, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Feb 27, 2021Updated 5 years ago
- ☆17Mar 15, 2023Updated 3 years ago
- ☆22Sep 16, 2022Updated 3 years ago
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- The release code of “Self-Representation Subspace Clustering for Incomplete Multi-view Data”☆12Aug 4, 2021Updated 4 years ago
- (TPAMI 2026) Complementary Text-Guided Attention for Zero-Shot Adversarial Robustness & & (NeurIPS 2024) Text-Guided Attention is All Y…☆20Mar 23, 2026Updated last month
- nips23-Dynamic Personalized Federated Learning with Adaptive Differential Privacy☆93Sep 10, 2024Updated last year
- Source code for the published paper "Parameter-Free Auto-Weighted Multiple Graph Learning" IJCAI 2016☆15Dec 4, 2017Updated 8 years ago
- Code for paper "One Pass Late Fusion Multi-view Clustering" (ICML 2021)☆16Jul 30, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- [TIFS 2024] SecureReID: Privacy-Preserving Anonymization for Person Re-Identification☆19Mar 9, 2024Updated 2 years ago
- ☆23Aug 24, 2020Updated 5 years ago
- EMVCC:Enhanced Multi-View Contrastive Clustering for Hyperspectral Images☆13Mar 5, 2026Updated last month
- code of Let the data choose: Flexible and Diverse Anchor Graph Fusion for Scalable Multi-view Clustering☆16Feb 28, 2023Updated 3 years ago
- ☆16May 24, 2024Updated last year
- ☆34May 2, 2021Updated 5 years ago
- PyTorch implementation of paper "Multi-Modal Proxy Learning Towards Personalized Visual Multiple Clustering" (CVPR 2024)☆15Jul 17, 2024Updated last year