☆17Jul 18, 2024Updated last year
Alternatives and similar repositories for Reconstruction-based-Attack
Users that are interested in Reconstruction-based-Attack are comparing it to the libraries listed below
Sorting:
- Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Dec 16, 2025Updated 2 months ago
- Benchmarking MIAs against LLMs.☆28Oct 8, 2024Updated last year
- List of T2I safety papers, updated daily, welcome to discuss using Discussions☆67Aug 12, 2024Updated last year
- ☆13May 8, 2024Updated last year
- This repository contains the source code for "Membership Inference Attacks as Privacy Tools: Reliability, Disparity and Ensemble", In Pro…☆10Jan 2, 2026Updated 2 months ago
- Aiming at the detection of the potential injury risk of the anterior cruciate ligament (ACL)☆11Feb 8, 2023Updated 3 years ago
- Object recognition with Pepper using a deep learning model☆10Sep 16, 2021Updated 4 years ago
- Official Repository for Dataset Inference for LLMs☆42Jul 25, 2024Updated last year
- TransMix: Transformer-based Value Function Decomposition for Cooperative Multi-agent Reinforcement Learning☆11Oct 18, 2022Updated 3 years ago
- Federated learning used to detect credit card fraud☆13Jun 23, 2020Updated 5 years ago
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)☆18Mar 31, 2025Updated 11 months ago
- [ECCV2024] "Just a Hint: Point-Supervised Camouflaged Object Detection"☆13Mar 21, 2025Updated 11 months ago
- 南开大学软件学院本科生课程资料分享☆28Nov 14, 2024Updated last year
- Website for release of TellMeWhy dataset for why question answering☆14Nov 11, 2022Updated 3 years ago
- ☆11Oct 27, 2019Updated 6 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆13Nov 19, 2024Updated last year
- ☆15Apr 4, 2024Updated last year
- Experimenting and exploring Computer Vision with Deep Learning☆10Mar 29, 2025Updated 11 months ago
- ☆12Jan 29, 2024Updated 2 years ago
- Experiments on Data Poisoning Regression Learning☆12Oct 5, 2020Updated 5 years ago
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆14Nov 3, 2024Updated last year
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated last year
- Control Blackmagic Design cameras using Bluetooth Low Energy☆11Apr 6, 2020Updated 5 years ago
- ☆14Oct 9, 2024Updated last year
- ☆11May 18, 2025Updated 9 months ago
- Auto1111 port of NVlab's adversarial purification method that uses the forward and reverse processes of diffusion models to remove advers…☆13Aug 8, 2023Updated 2 years ago
- Beginner's tutorial for working with the Google Earth Engine Python API in Jupyter Notebooks. The tutorial walks through a GEE workflow …☆14Jul 10, 2020Updated 5 years ago
- python期末作业坦克大战,使用pygame☆11Jun 18, 2021Updated 4 years ago
- ☆29Feb 20, 2025Updated last year
- A powerful framework for decentralized federated learning with user-defined communication topology☆12Dec 14, 2021Updated 4 years ago
- Gaussian Membership Inference Privacy (NeurIPS 2023)☆12Jul 27, 2024Updated last year
- 4.99 projection driver board☆15Oct 2, 2019Updated 6 years ago
- Large Language Models Can Be Contextual Privacy Protection Learners☆15Oct 28, 2024Updated last year
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆13Jun 20, 2023Updated 2 years ago
- ☆17Sep 22, 2024Updated last year
- [ECCV2024] Immunizing text-to-image Models against Malicious Adaptation☆17Jan 17, 2025Updated last year
- ☆14Dec 31, 2024Updated last year
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago