D1aoBoomm / TSQP
TSQP: Safeguarding Real-Time Inference for Quantization Neural Networks on Edge Devices (Accepted to S&P 2025)
☆12Updated this week
Alternatives and similar repositories for TSQP:
Users that are interested in TSQP are comparing it to the libraries listed below
- Open-source code and data for ShadowNet(S&P Oakland'23)☆9Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆141Updated last month
- ☆31Updated 2 weeks ago
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Updated 3 years ago
- ☆220Updated 10 months ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆50Updated 2 years ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆256Updated 4 months ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Updated last year
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆48Updated 6 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆84Updated last year
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆17Updated 3 months ago
- PPA attack code☆12Updated 2 years ago
- Code for ML Doctor☆87Updated 8 months ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆83Updated 3 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆13Updated 11 months ago
- [TDSC 2024] Official code for our paper "FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model"☆15Updated 3 months ago
- ☆20Updated 7 months ago
- ☆51Updated last year
- ☆18Updated 2 years ago
- Code repository for the paper at USENIX Security'24☆27Updated 8 months ago
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆125Updated last year
- ☆16Updated 4 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆283Updated 5 years ago
- [KDD 2024] Is Aggregation the Only Choice? Federated Learning via Layer-wise Model Recombination☆25Updated 5 months ago
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆18Updated 4 months ago
- ☆22Updated last year
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆83Updated 2 years ago
- ☆14Updated last year
- ☆9Updated 4 months ago
- ☆10Updated 5 months ago