☆10Jun 5, 2021Updated 4 years ago
Alternatives and similar repositories for extract_and_transfer
Users that are interested in extract_and_transfer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CME: Concept-based Model Extraction☆13Nov 24, 2020Updated 5 years ago
- A2T: Towards Improving Adversarial Training of NLP Models (EMNLP 2021 Findings)☆27Sep 12, 2021Updated 4 years ago
- Code for "Imitation Attacks and Defenses for Black-box Machine Translations Systems"☆34May 1, 2020Updated 5 years ago
- 📄 [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools☆14May 23, 2023Updated 2 years ago
- ☆14May 8, 2024Updated last year
- Black-Box Ripper: Copying black-box models using generative evolutionary algorithms - NIPS 2020 - Official Implementation☆29Oct 25, 2020Updated 5 years ago
- MEME: Generating RNN Model Explanations via Model Extraction☆14Jan 7, 2021Updated 5 years ago
- Used the Functional API to built custom layers and non-sequential model types in TensorFlow, performed object detection, image segmentati…☆11Jun 9, 2021Updated 4 years ago
- ☆19Mar 6, 2023Updated 3 years ago
- ☆10Jul 13, 2024Updated last year
- Copycat CNN☆28Apr 17, 2024Updated last year
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆21Jun 11, 2022Updated 3 years ago
- ☆10Apr 21, 2022Updated 3 years ago
- pytorch handbook是一本开源的书籍,目标是帮助那些希望和使用PyTorch进行深度学习开发和研究的朋友快速入门,其中包含的Pytorch教程全部通过测试保证可以成功运行☆13Mar 25, 2022Updated 3 years ago
- ☆12Sep 26, 2024Updated last year
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- Query-Efficient Data-Free Learning from Black-Box Models☆23Mar 20, 2023Updated 3 years ago
- [ICLR 2022] Boosting Randomized Smoothing with Variance Reduced Classifiers☆11Mar 29, 2022Updated 3 years ago
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- Tensorflow Implementation of Neural Conversational Model by Vinyals et.al.☆12Sep 3, 2016Updated 9 years ago
- A collection of beautiful plots, and other data visualization stuff.☆15Jan 8, 2022Updated 4 years ago
- ☆13Apr 12, 2022Updated 3 years ago
- ☆11Mar 6, 2022Updated 4 years ago
- ☆13Jun 10, 2023Updated 2 years ago
- [NeurIPS 2023] and [ICLR 2024] for robustness certification.☆10Nov 30, 2024Updated last year
- Membership Inference Attack against Graph Neural Networks☆12Nov 9, 2022Updated 3 years ago
- ☆12Jul 16, 2025Updated 8 months ago
- The EWF-link origin app integrates green energy assets to the coo smart-contracts.☆13Dec 8, 2022Updated 3 years ago
- ☆11May 13, 2018Updated 7 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- ☆13Jan 14, 2026Updated 2 months ago
- Casande-RL☆11May 9, 2023Updated 2 years ago
- Code for the paper "Multi-scale Diffusion Denoised Smoothing" (NeurIPS 2023)☆15Apr 30, 2024Updated last year
- 4th place solution of ESA Kelvin Mars Explorer Power Challenge☆11Aug 6, 2016Updated 9 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆34Jul 15, 2021Updated 4 years ago