overgter / Deep-Learning-Model-Inversion-Attacks-and-DefensesLinks
This is a comprehensive resource repository for deep learning model inversion attacks and defenses research.
☆23Updated 5 months ago
Alternatives and similar repositories for Deep-Learning-Model-Inversion-Attacks-and-Defenses
Users that are interested in Deep-Learning-Model-Inversion-Attacks-and-Defenses are comparing it to the libraries listed below
Sorting:
- This repository contains Python code for the paper "Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearni…☆19Updated last year
 - [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆208Updated 5 months ago
 - A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆221Updated last year
 - [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆24Updated last month
 - A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆182Updated last month
 - ☆12Updated 2 months ago
 - [ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.☆48Updated last year
 - [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆42Updated last month
 - A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆273Updated 9 months ago
 - [CVPR-2023] Re-thinking Model Inversion Attacks Against Deep Neural Networks☆42Updated last year
 - ☆552Updated 3 months ago
 - ☆27Updated 2 years ago
 - ☆15Updated last year
 - [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆61Updated 10 months ago
 - ☆25Updated 2 years ago
 - Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆26Updated 4 months ago
 - IBA: Towards Irreversible Backdoor Attacks in Federated Learning (Poster at NeurIPS 2023)☆37Updated last month
 - A curated list of papers for the transferability of adversarial examples☆74Updated last year
 - Code related to the paper "Machine Unlearning of Features and Labels"☆71Updated last year
 - Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆130Updated 2 years ago
 - Revisiting Transferable Adversarial Images (TPAMI 2025)☆134Updated last month
 - Invisible Backdoor Attack with Sample-Specific Triggers☆102Updated 3 years ago
 - ☆24Updated 2 years ago
 - ☆32Updated 4 years ago
 - ☆45Updated 2 years ago
 - [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆44Updated last month
 - [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆45Updated 3 months ago
 - Webank AI☆43Updated 8 months ago
 - Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆30Updated 3 years ago
 - Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆40Updated 2 years ago