Unofficial pytorch implementation of paper: Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
☆58Sep 28, 2025Updated 7 months ago
Alternatives and similar repositories for MIA
Users that are interested in MIA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Mar 3, 2025Updated last year
- ☆15Mar 3, 2025Updated last year
- ☆35Mar 31, 2025Updated last year
- 网络安全测试平台专为系统脆弱性和安全性检测设计,支持 Ubuntu 20.04 操作系统。功能包括资产清点、安全基线检测、安全风险评估和安全等级保护测评,并输出详细的检测报告。☆128Oct 7, 2025Updated 7 months ago
- RemoteDesktop☆37Dec 12, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Cybersecurity Testing and Verification Range Platform☆37Mar 19, 2025Updated last year
- ☆40Mar 12, 2025Updated last year
- ☆62Jun 24, 2025Updated 10 months ago
- Traffic-Analysis-Base-DPDK☆142Apr 2, 2025Updated last year
- ☆50Jun 1, 2023Updated 2 years ago
- ☆51Apr 30, 2023Updated 3 years ago
- ☆59Apr 13, 2025Updated last year
- ☆50Sep 21, 2020Updated 5 years ago
- ☆25Mar 26, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆32Mar 24, 2025Updated last year
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆84Feb 26, 2023Updated 3 years ago
- ☆64Updated this week
- A 🌟free, 🫣anonymous, 🔐encrypted, and 🚀easy-to-use E2EE file transfer tool☆680Apr 7, 2026Updated last month
- The project, based on the VTK toolkit with a Qt interface, supports reading medical image formats, zooming, grayscale transformations, an…☆82Feb 27, 2025Updated last year
- paper code☆28Oct 5, 2020Updated 5 years ago
- [CVPR-2023] Re-thinking Model Inversion Attacks Against Deep Neural Networks☆43Nov 12, 2023Updated 2 years ago
- ☆12Nov 10, 2020Updated 5 years ago
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆67Oct 4, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for NDSS 2022 paper "MIRROR: Model Inversion for Deep Learning Network with High Fidelity"☆27May 9, 2023Updated 3 years ago
- ☆13Apr 13, 2025Updated last year
- ☆14Jan 3, 2024Updated 2 years ago
- ☆11May 19, 2025Updated 11 months ago
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆59May 12, 2019Updated 6 years ago
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆193Sep 23, 2025Updated 7 months ago
- 数据脱敏处理☆13Dec 7, 2025Updated 5 months ago
- Balanced K-means in Pytorch with strong GPU acceleration☆12Apr 30, 2020Updated 6 years ago
- A challenge to investigate the security of the InstaHide protocol.☆12Dec 7, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Decentralized Asynchronous Training on Heterogeneous Devices☆10Updated this week
- ☆46Sep 24, 2023Updated 2 years ago
- This Projects has implemented three asymmetric and homomorphic encryption BGN, Benaloh, Paillier in Java using JPBC library.☆10Dec 27, 2019Updated 6 years ago
- Differentially Private Federated Learning on Heterogeneous Data☆77Feb 22, 2022Updated 4 years ago
- Adaptive Resource-Aware Split-Learning, a framework for efficient model training in IoT systems☆15Jul 23, 2023Updated 2 years ago
- ☆90May 27, 2020Updated 5 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago