sutd-visual-computing-group / Re-thinking_MILinks
[CVPR-2023] Re-thinking Model Inversion Attacks Against Deep Neural Networks
☆39Updated last year
Alternatives and similar repositories for Re-thinking_MI
Users that are interested in Re-thinking_MI are comparing it to the libraries listed below
Sorting:
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆42Updated 10 months ago
- ☆44Updated last year
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆23Updated 2 months ago
- ☆11Updated 2 months ago
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆37Updated 9 months ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆28Updated 8 months ago
- Improving Robustness to Model Inversion Attacks via Mutual Information Regularization (AAAI 2021)☆6Updated 2 years ago
- ☆31Updated 4 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆50Updated 2 years ago
- [ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.☆42Updated 11 months ago
- ☆26Updated 2 years ago
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Updated 3 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 2 years ago
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆36Updated 8 months ago
- Anti-Backdoor learning (NeurIPS 2021)☆81Updated last year
- ☆82Updated 3 years ago
- ☆31Updated 3 years ago
- ☆70Updated 3 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Updated 4 years ago
- ☆21Updated 3 years ago
- Query-Efficient Data-Free Learning from Black-Box Models☆22Updated 2 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆35Updated 2 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆36Updated 3 years ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆48Updated last year
- ☆26Updated last year
- ☆25Updated 3 years ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆38Updated last year
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 2 years ago
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆56Updated 6 months ago
- Code Repository for the Paper ---Revisiting the Assumption of Latent Separability for Backdoor Defenses (ICLR 2023)☆42Updated 2 years ago