DevPranjal / mico-first-principlesLinks
Our submission for the Microsoft Membership Inference Competion at SaTML 2023
☆15Updated 2 years ago
Alternatives and similar repositories for mico-first-principles
Users that are interested in mico-first-principles are comparing it to the libraries listed below
Sorting:
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆38Updated 10 months ago
- Code for the paper: Label-Only Membership Inference Attacks☆66Updated 3 years ago
- ☆57Updated 5 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆48Updated 3 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆70Updated last year
- This repository contains Python code for the paper "Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearni…☆17Updated last year
- ☆338Updated 2 weeks ago
- Implementations of data poisoning attacks against neural networks and related defenses.☆88Updated last year
- The source code for ICML2021 paper When Does Data Augmentation Help With Membership Inference Attacks?☆8Updated 3 years ago
- ☆13Updated last year
- [NeurIPS23 (Spotlight)] "Model Sparsity Can Simplify Machine Unlearning" by Jinghan Jia*, Jiancheng Liu*, Parikshit Ram, Yuguang Yao, Gao…☆76Updated last year
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 3 years ago
- 🔒 Implementation of Shokri et al(2016) "Membership Inference Attacks against Machine Learning Models"☆36Updated 2 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆50Updated 2 years ago
- Code to reproduce experiments in "Antipodes of Label Differential Privacy PATE and ALIBI"☆32Updated 3 years ago
- ☆25Updated 3 years ago
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆60Updated 6 years ago
- ☆30Updated last year
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆127Updated last year
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆25Updated 3 years ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆19Updated 2 years ago
- ☆70Updated 3 years ago
- The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".☆34Updated 2 years ago
- Likelihood Ratio Attack (LiRA) in PyTorch☆15Updated 4 months ago
- ☆32Updated 3 years ago
- [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆182Updated last month
- Code for ML Doctor☆91Updated 11 months ago
- ☆46Updated 11 months ago
- ☆16Updated 6 years ago
- ☆13Updated last year