/attack-and-defense

codebook of various attacks and defenses

attack-and-defense

codebook of various attacks and defenses

Data Extraction

Data Extraction Attacks

[1]. Carlini, Nicholas, et al. "The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks." [USENIX Security 2019]

[2]. Lehman, Eric, et al. "Does BERT Pretrained on Clinical Notes Reveal Sensitive Data?." [NAACL 2021]

Data Extraction Defenses

Model Extraction

Model Extraction Attacks

Model Extraction Defenses

Backdoor

Backdoor Attacks

Backdoor Defenses

Fingerprint

Identify Fingerprint in GAN

[1]. Francesco Marra, Diego Gragnaniello, Luisa Verdoliva, and Giovanni Poggi. Do gans leave artificial fingerprints? MIPR 2019

[2]. Ning Yu, Larry S Davis, and Mario Fritz. Attributing fake images to gans: Learning and analyzing gan fingerprints. ICCV 2019