☆15Aug 29, 2023Updated 2 years ago
Alternatives and similar repositories for rog
Users that are interested in rog are comparing it to the libraries listed below
Sorting:
- Membership Inference Attack on Federated Learning☆12Jan 14, 2022Updated 4 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆57May 4, 2023Updated 2 years ago
- ☆36Jan 5, 2022Updated 4 years ago
- Research into model inversion on SplitNN☆18Feb 20, 2024Updated 2 years ago
- PyTorch implementation of Joint Privacy Enhancement and Quantization in Federated Learning (IEEE TSP 2023, IEEE ICASSP 2023, IEEE ISIT 20…☆18Oct 28, 2025Updated 4 months ago
- A pytorch implementation of the paper "Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage".☆62Oct 24, 2022Updated 3 years ago
- ☆26Dec 14, 2021Updated 4 years ago
- AutoML, Privacy Preserving, Federated Learning☆26Jun 8, 2023Updated 2 years ago
- Official codes for "Understanding Deep Gradient Leakage via Inversion Influence Functions", NeurIPS 2023☆15Oct 13, 2023Updated 2 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆56May 28, 2019Updated 6 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- ☆16Sep 17, 2024Updated last year
- ☆10Apr 21, 2022Updated 3 years ago
- Speech Security and Privacy Compendium - Mini☆10Jun 18, 2024Updated last year
- ☆11Nov 21, 2022Updated 3 years ago
- Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"☆33Feb 28, 2022Updated 4 years ago
- [KDD'21] Official PyTorch implementation for "Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data".☆13Sep 19, 2021Updated 4 years ago
- FGLA: Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients☆14Updated this week
- Security and Privacy Risk Simulator for Machine Learning (arXiv:2312.17667)☆422Jan 9, 2026Updated 2 months ago
- ☆44Apr 25, 2023Updated 2 years ago
- ☆12Oct 29, 2022Updated 3 years ago
- Tis is code for Few-Shot Joint Multimodal Entity-Relation Extraction via Knowledge-Enhanced Cross-modal Prompt Model (ACM MM 2024))☆12Aug 27, 2024Updated last year
- A decentralized learning research framework☆39May 14, 2024Updated last year
- reveal the vulnerabilities of SplitNN☆31Jun 16, 2022Updated 3 years ago
- A web app that learns to repair your command line mistakes.☆15Jan 13, 2017Updated 9 years ago
- Code repo for the UAI 2023 paper "Learning To Invert: Simple Adaptive Attacks for Gradient Inversion in Federated Learning".☆16Jun 15, 2024Updated last year
- ☆17May 1, 2022Updated 3 years ago
- Dataset and code for ”EATN: An Efficient Adaptive Transfer Network for Aspect-level Sentiment Analysis"☆16Jun 22, 2021Updated 4 years ago
- ☆20Feb 3, 2025Updated last year
- Image and text encryption using Shamir's Secret Sharing algorithm☆14Feb 17, 2020Updated 6 years ago
- Surrogate Model Extension (SME): A Fast and Accurate Weight Update Attack on Federated Learning [Accepted at ICML 2023]☆14Mar 31, 2024Updated last year
- Privacy attacks on Split Learning☆43Nov 15, 2021Updated 4 years ago
- ☆18May 30, 2025Updated 9 months ago
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Oct 15, 2017Updated 8 years ago
- Implement of Implicit Knowledge Extraction Attack.☆20May 28, 2025Updated 9 months ago
- We propose a self-driving approach to online index selection that eschews the DBA and query optimiser, and instead learns the benefits of…☆13Jan 8, 2023Updated 3 years ago
- Secure Inference Resilient Against Malicious Clients☆14May 3, 2022Updated 3 years ago