[CVPR-2023] Re-thinking Model Inversion Attacks Against Deep Neural Networks
☆43Nov 12, 2023Updated 2 years ago
Alternatives and similar repositories for Re-thinking_MI
Users that are interested in Re-thinking_MI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Apr 13, 2025Updated last year
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆24Sep 11, 2025Updated 7 months ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆32Oct 15, 2024Updated last year
- [ECCV-2024 oral] Source code for our paper "A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion At…☆24Sep 22, 2024Updated last year
- ☆46Sep 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆34May 2, 2021Updated 4 years ago
- ☆27Sep 23, 2022Updated 3 years ago
- [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆221Apr 3, 2026Updated 3 weeks ago
- Code for NDSS 2022 paper "MIRROR: Model Inversion for Deep Learning Network with High Fidelity"☆27May 9, 2023Updated 2 years ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆193Sep 23, 2025Updated 7 months ago
- [NeurIPS-2022] Annual Conference on Neural Information Processing Systems☆20Dec 21, 2023Updated 2 years ago
- [ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.☆52Jul 13, 2024Updated last year
- Unofficial pytorch implementation of paper: Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures☆58Sep 28, 2025Updated 7 months ago
- ☆10Apr 21, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code of Data-Free Knowledge Distillation via Feature Exchange and Activation Region Constraint☆21Oct 23, 2023Updated 2 years ago
- FGLA: Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients☆14Mar 17, 2026Updated last month
- Official implementation of the paper "Robust and Resource-Efficient Data-Free Knowledge Distillation by Generative Pseudo Replay" (AAAI-2…☆18May 5, 2022Updated 3 years ago
- Knowledge distillation (KD) from a decision-based black-box (DB3) teacher without training data.☆22May 3, 2022Updated 3 years ago
- This repository contains the source code for "Membership Inference Attacks as Privacy Tools: Reliability, Disparity and Ensemble", In Pro…☆10Jan 2, 2026Updated 3 months ago
- Official Source Code of "Exploring Effective Data for Surrogate Training Towards Black-box Attack" and "STDatav2: Accessing Efficient Bla…☆21Apr 16, 2025Updated last year
- ☆17Dec 13, 2019Updated 6 years ago
- ☆26Oct 27, 2025Updated 6 months ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Open sourced implementation of a prototype for Hyperledger Fabric chaincode execution with OP-TEE. This work is part of the master thesis…☆14Sep 10, 2019Updated 6 years ago
- Official Pytorch implementation of IJCAI'21 paper "GraphMI: Extracting Private Graph Data from Graph Neural Networks"☆13Nov 19, 2021Updated 4 years ago
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆48Aug 18, 2022Updated 3 years ago
- Paper list of LLM fingerprinting, based on our paper titled "SoK: Large Language Model Copyright Auditing via Fingerprinting".☆23Aug 28, 2025Updated 8 months ago
- Black-box Few-shot Knowledge Distillation☆14Jul 19, 2022Updated 3 years ago
- Paper List for Gradient Inversion Attacks in Federated Learning [IEEE TPAMI 2026]☆34Apr 20, 2026Updated last week
- ☆12Jun 12, 2024Updated last year
- OP-TEE port for the Raspberry Pi 4 platform☆22Nov 18, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A library used to create low performant idle applications in Unity☆11Aug 8, 2023Updated 2 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated 2 years ago
- 基于用户的协同过滤(UserCF)与基于内容(CB)的推荐算法的后融合☆13Nov 20, 2020Updated 5 years ago
- ☆31Nov 17, 2024Updated last year
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- ☆34Mar 28, 2022Updated 4 years ago
- Trustzone vexpress helloworld example☆18May 1, 2016Updated 10 years ago