A toolkit for tools and techniques related to the privacy and compliance of AI models.
☆112Sep 17, 2025Updated 7 months ago
Alternatives and similar repositories for ai-privacy-toolkit
Users that are interested in ai-privacy-toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆32Sep 2, 2024Updated last year
- code for ResSys'18 paper: "Exploring Recommendations Under User-Controlled Data Filtering"☆23Oct 16, 2018Updated 7 years ago
- This the bunkoer library, for secure your data on all your llm task☆10Jan 2, 2024Updated 2 years ago
- Diffprivlib: The IBM Differential Privacy Library☆911Sep 17, 2025Updated 7 months ago
- ☆47Aug 19, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Official PyTorch Implementation for Continual Learning and Private Unlearning☆19Jul 19, 2022Updated 3 years ago
- Code and data for the ACM CIKM 2022 paper "Rank List Sensitivity of Recommender Systems to Interaction Perturbations"☆10Aug 16, 2022Updated 3 years ago
- ☆12Aug 8, 2023Updated 2 years ago
- The official repository containing the source code to the explAIner publication.☆32Apr 29, 2024Updated 2 years ago
- ☆16Sep 8, 2021Updated 4 years ago
- CoRelAy is a tool to compose small-scale (single-machine) analysis pipelines.☆32Jul 21, 2025Updated 9 months ago
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆132Apr 9, 2024Updated 2 years ago
- Resources for private and secure Machine Learning and Artificial Intelligence☆13Jun 13, 2022Updated 3 years ago
- Gaussian Membership Inference Privacy (NeurIPS 2023)☆12Jul 27, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🔥 React library of AI components 🔥☆139Sep 2, 2024Updated last year
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆56May 28, 2019Updated 6 years ago
- ☆18Dec 3, 2015Updated 10 years ago
- The privML Privacy Evaluator is a tool that assesses ML model's levels of privacy by running different attacks on it.☆18Sep 6, 2021Updated 4 years ago
- Prototypical Concept-based Explanations, accepted at SAIAD workshop at CVPR 2024.☆15Feb 20, 2026Updated 2 months ago
- DARE UK Sprint Project: Trusted Research Environment and Enclave for Hosting Open Original Science Exploration☆13Sep 2, 2024Updated last year
- ☆14Nov 11, 2025Updated 5 months ago
- [NeurIPS XAIA & Springer] Code and notebooks to paper "A Fresh Look at Sanity Checks for Saliency Maps"☆25Jul 12, 2024Updated last year
- Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and…☆5,949Dec 12, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [NeurIPS 2024] CoSy is an automatic evaluation framework for textual explanations of neurons.☆19Jan 28, 2026Updated 3 months ago
- Reference code for creating and verifying a GCE firmware signed reference value message.☆23Nov 18, 2025Updated 5 months ago
- ☆21Oct 25, 2021Updated 4 years ago
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆73Feb 11, 2026Updated 2 months ago
- Hyperledger Fabric Network bootstrapping made simple for experimentation, development and testing☆13May 22, 2020Updated 5 years ago
- TARGET is a benchmark for evaluating Table Retrieval for Generative Tasks such as Fact Verification and Text-to-SQL☆27Jul 14, 2025Updated 9 months ago
- Forked from tf-rmm@trustedfirmware, support QEMU platform. Check wiki for instruction. https://github.com/Huawei/Huawei_CCA_RMM/wiki☆21Apr 15, 2023Updated 3 years ago
- git-history-data analyses a Git source code repository and dumps out data in a form that is easy to analyse.☆17Jun 11, 2024Updated last year
- Composite Backdoor Attacks Against Large Language Models☆25Apr 12, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Formal specification of attestation mechanisms in Confidential Computing☆24Nov 22, 2025Updated 5 months ago
- Source code for "Neural Anisotropy Directions"☆16Nov 17, 2020Updated 5 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆13Sep 6, 2023Updated 2 years ago
- ☆38May 7, 2025Updated 11 months ago
- SAP Security Research sample code to reproduce the research done in our paper "Comparing local and central differential privacy using mem…☆19May 7, 2024Updated last year
- ☆27Oct 16, 2022Updated 3 years ago
- Reveal to Revise: An Explainable AI Life Cycle for Iterative Bias Correction of Deep Models. Paper presented at MICCAI 2023 conference.☆20Jan 17, 2024Updated 2 years ago