SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice
☆16May 19, 2025Updated 11 months ago
Alternatives and similar repositories for ML_Extraction_Sok
Users that are interested in ML_Extraction_Sok are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Aug 10, 2021Updated 4 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆15Jun 2, 2022Updated 3 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- Exploring Methods of Protecting Confidential Erlang Workloads with Intel SGX☆12Jun 19, 2020Updated 5 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 6 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆22Aug 23, 2022Updated 3 years ago
- ☆15Aug 16, 2021Updated 4 years ago
- ☆21Nov 14, 2024Updated last year
- Occlum's fork of Intel SGX SDK for Linux☆13Jul 31, 2024Updated last year
- ☆15Jan 24, 2021Updated 5 years ago
- compile yolov3 in TVM☆13Aug 14, 2023Updated 2 years ago
- Intel® Software Guard Extensions (Intel® SGX) Samples☆11Dec 2, 2016Updated 9 years ago
- ☆11Mar 20, 2017Updated 9 years ago
- ☆16Sep 12, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Trusted Gateway: hardened router architecture with ARM TrustZone protected firewall, routing, and NIC modules.☆14Jul 19, 2022Updated 3 years ago
- ☆14Sep 1, 2022Updated 3 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆51May 9, 2025Updated 11 months ago
- ☆10Feb 4, 2024Updated 2 years ago
- ☆63Mar 26, 2026Updated last month
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 4 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆30May 16, 2022Updated 3 years ago
- A collection of papers and libraries for performing multi-agent optimization☆18Feb 7, 2026Updated 2 months ago
- The server part of the SafeKeeper project.☆17Jul 12, 2018Updated 7 years ago
- ☆21Sep 7, 2022Updated 3 years ago
- [TIFS'22]Smart App Attack: Hacking Deep Learning Models in Android Apps☆16Jun 8, 2022Updated 3 years ago
- ☆10Mar 24, 2022Updated 4 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- ☆13Apr 9, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A code confidentiality framework for Intel SGX☆19Jan 8, 2019Updated 7 years ago
- A library and an application to provide migratable primitives for SGX enclaves.☆22Feb 28, 2020Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- Canadian Debt Strategy Model☆19Dec 14, 2023Updated 2 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Nov 10, 2020Updated 5 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago