JialinMao / private_CNNLinks
☆10Updated 3 years ago
Alternatives and similar repositories for private_CNN
Users that are interested in private_CNN are comparing it to the libraries listed below
Sorting:
- ☆15Updated 2 years ago
- ☆23Updated 3 years ago
- ☆27Updated 3 years ago
- ☆24Updated 3 years ago
- Code for Auditing DPSGD☆37Updated 3 years ago
- Private Adaptive Optimization with Side Information (ICML '22)☆16Updated 3 years ago
- [CCS 2021] "DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation" by Boxin Wang*, Fan Wu*, Yunhui Long…☆36Updated 4 years ago
- ☆32Updated last year
- R-GAP: Recursive Gradient Attack on Privacy [Accepted at ICLR 2021]☆37Updated 2 years ago
- ☆12Updated 2 years ago
- ☆26Updated 4 years ago
- ☆80Updated 3 years ago
- Code to reproduce experiments in "Antipodes of Label Differential Privacy PATE and ALIBI"☆32Updated 3 years ago
- This repo implements several algorithms for learning with differential privacy.☆111Updated 3 years ago
- ☆25Updated 3 years ago
- ☆19Updated 2 years ago
- Official codes for "Understanding Deep Gradient Leakage via Inversion Influence Functions", NeurIPS 2023☆16Updated 2 years ago
- Official code for FAccT'21 paper "Fairness Through Robustness: Investigating Robustness Disparity in Deep Learning" https://arxiv.org/abs…☆13Updated 4 years ago
- ☆18Updated 3 years ago
- Certified Removal from Machine Learning Models☆69Updated 4 years ago
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Updated last year
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆39Updated 6 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 3 years ago
- Official repo for the paper: Recovering Private Text in Federated Learning of Language Models (in NeurIPS 2022)☆61Updated 2 years ago
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆27Updated 3 years ago
- A fast algorithm to optimally compose privacy guarantees of differentially private (DP) mechanisms to arbitrary accuracy.☆76Updated last year
- Code for Auditing Data Provenance in Text-Generation Models (in KDD 2019)☆10Updated 6 years ago
- Code repo for the paper "Privacy-aware Compression for Federated Data Analysis".☆19Updated 2 years ago
- ☆17Updated 2 years ago
- ☆46Updated 6 years ago