CoPur: Certifiably Robust Collaborative Inference via Feature Purification (NeurIPS 2022)
☆11Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for CoPur
Users that are interested in CoPur are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The implementatioin code of paper: “A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning”☆11Jul 1, 2023Updated 2 years ago
- ☆17Jun 25, 2024Updated last year
- The code of the attack scheme in the paper "Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning"☆21Oct 13, 2023Updated 2 years ago
- Code Repo for paper Label Leakage and Protection in Two-party Split Learning (ICLR 2022).☆22Mar 12, 2022Updated 4 years ago
- The implementation of FedBCD algorithm published in the paper "FedBCD: A Communication-Efficient Collaborative Learning Framework for Dis…☆16Jul 2, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Nov 26, 2019Updated 6 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆86Jun 27, 2023Updated 2 years ago
- THU-AIR Vertical Federated Learning general, extensible and light-weight framework☆104Jul 18, 2024Updated last year
- ☆12Jan 2, 2025Updated last year
- KNN Defense Against Clean Label Poisoning Attacks☆13Sep 24, 2021Updated 4 years ago
- Implementation of BapFL: You can Backdoor Attack Personalized Federated Learning☆15Sep 18, 2023Updated 2 years ago
- The implementation of FedHSSL algorithm published in the paper "A Hybrid Self-Supervised Learning Framework for Vertical Federated Learni…☆14Jul 13, 2024Updated last year
- A modular management and configuration framework for distributed real-time applications in a TSN-based network☆10Sep 5, 2024Updated last year
- ☆11Dec 22, 2025Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆19Apr 12, 2023Updated 2 years ago
- Final year research project to design a programmable virtual switch based on the specifications of a TSN to be implemented on a TSN netwo…☆13Nov 17, 2020Updated 5 years ago
- ☆13Aug 14, 2023Updated 2 years ago
- [PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Feb 27, 2021Updated 5 years ago
- Determine a schedule for running a set of jobs on a certain number of machines using the LeapHybridCQMSampler.☆16Feb 25, 2026Updated last month
- SVIP: Towards Verifiable Inference of Open-Source Large Language Models☆15Jun 3, 2025Updated 10 months ago
- Federated Adversrial Learning/ Training Framework. A testing ground for conducting relevant research.☆11Oct 9, 2022Updated 3 years ago
- [ICLR 2024]: Is Self-Repair a Silver Bullet for Code Generation?☆15May 2, 2024Updated last year
- Simulating the quantum approximate optimization algorithm with Matlab☆12Aug 26, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 基于《A Little Is Enough: Circumventing Defenses For Distributed Learning》的联邦学习攻击模型☆65May 22, 2020Updated 5 years ago
- Code for paper "Locally Distributed Deep Learning Inference on Edge Device Clusters"☆15Aug 22, 2025Updated 7 months ago
- [CVPR 2023] "TrojViT: Trojan Insertion in Vision Transformers" by Mengxin Zheng, Qian Lou, Lei Jiang☆14Jan 5, 2024Updated 2 years ago
- ☆13Oct 11, 2021Updated 4 years ago
- THU-AIR 联邦学习隐私与安全☆13Jun 26, 2023Updated 2 years ago
- solving knapsack problem with n items with GA(genetic algorithm)☆11Feb 22, 2025Updated last year
- INDICT: Code Generation with Internal Dialogues of Critiques for Both Security and Helpfulness☆14Nov 10, 2025Updated 5 months ago
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆29Jun 29, 2023Updated 2 years ago
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆18May 13, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- ☆15Dec 9, 2021Updated 4 years ago
- ☆13Oct 11, 2024Updated last year
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (ICML 2021)☆74Aug 5, 2021Updated 4 years ago
- MSS: Exploiting Mapping Score for CQF Start Time Planning in Time-Sensitive Networking☆18Jun 26, 2023Updated 2 years ago
- Official repository for the paper, "FedMABench: Benchmarking Mobile GUI Agents on Decentralized Heterogeneous User Data", EMNLP 2025 Main…☆16Nov 11, 2025Updated 5 months ago
- ☆17Mar 25, 2024Updated 2 years ago