☆18Jul 18, 2024Updated last year
Alternatives and similar repositories for Reconstruction-based-Attack
Users that are interested in Reconstruction-based-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Dec 16, 2025Updated 3 months ago
- ☆14Oct 9, 2024Updated last year
- Benchmarking MIAs against LLMs.☆28Oct 8, 2024Updated last year
- Experiments on Data Poisoning Regression Learning☆12Oct 5, 2020Updated 5 years ago
- ☆12Jan 29, 2024Updated 2 years ago
- List of T2I safety papers, updated daily, welcome to discuss using Discussions☆68Aug 12, 2024Updated last year
- ☆11May 18, 2025Updated 10 months ago
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆32Jun 24, 2025Updated 9 months ago
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- Long-form factuality assessor for large language models☆29Updated this week
- Official Repository for Dataset Inference for LLMs☆41Jul 25, 2024Updated last year
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated 10 months ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 6 months ago
- ☆13May 8, 2024Updated last year
- 4.99 projection driver board☆15Oct 2, 2019Updated 6 years ago
- Beginner's tutorial for working with the Google Earth Engine Python API in Jupyter Notebooks. The tutorial walks through a GEE workflow …☆14Jul 10, 2020Updated 5 years ago
- Model Extraction(Stealing) Attacks and Defenses on Machine Learning Models Literature☆30Sep 25, 2024Updated last year
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- ☆13Feb 21, 2025Updated last year
- Gaussian Membership Inference Privacy (NeurIPS 2023)☆12Jul 27, 2024Updated last year
- Provably Secure Steganography☆14Sep 13, 2025Updated 6 months ago
- Federated learning used to detect credit card fraud☆13Jun 23, 2020Updated 5 years ago
- Website for release of TellMeWhy dataset for why question answering☆14Nov 11, 2022Updated 3 years ago
- Object recognition with Pepper using a deep learning model☆10Sep 16, 2021Updated 4 years ago
- ☆21Jul 26, 2025Updated 7 months ago
- [SatML 2024] Shake to Leak: Fine-tuning Diffusion Models Can Amplify the Generative Privacy Risk☆15Mar 15, 2025Updated last year
- Demo showing how to package and execute a Federated Learning jobs on Nevermined.☆13Dec 6, 2022Updated 3 years ago
- ☆21May 23, 2025Updated 10 months ago
- python期末作业坦克大战,使用pygame☆11Jun 18, 2021Updated 4 years ago
- A powerful framework for decentralized federated learning with user-defined communication topology☆12Dec 14, 2021Updated 4 years ago
- ☆11Nov 13, 2022Updated 3 years ago
- Control Blackmagic Design cameras using Bluetooth Low Energy☆12Apr 6, 2020Updated 5 years ago
- ☆15Apr 4, 2024Updated last year
- ☆25Apr 15, 2024Updated last year
- Effective Prompt Extraction from Language Models☆34Sep 10, 2024Updated last year
- This repository contains the source code for "Membership Inference Attacks as Privacy Tools: Reliability, Disparity and Ensemble", In Pro…☆10Jan 2, 2026Updated 2 months ago
- 特充电——桩站管理小程序(一)为新能源车主指引一个合适的充电桩位置(当前闲置没有其他车停在这个车位上、位置最近、价格最优的); (二)为桩站免费建立门闸,阻挡非充电车辆随意进入; (三)给桩站提供管理后台,让他们查看电费和资金的情况。☆17Dec 8, 2022Updated 3 years ago
- TransMix: Transformer-based Value Function Decomposition for Cooperative Multi-agent Reinforcement Learning☆11Oct 18, 2022Updated 3 years ago