☆15Aug 29, 2023Updated 2 years ago
Alternatives and similar repositories for rog
Users that are interested in rog are comparing it to the libraries listed below
Sorting:
- Membership Inference Attack on Federated Learning☆12Jan 14, 2022Updated 4 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆57May 4, 2023Updated 2 years ago
- Research into model inversion on SplitNN☆18Feb 20, 2024Updated 2 years ago
- ☆36Jan 5, 2022Updated 4 years ago
- PyTorch implementation of Joint Privacy Enhancement and Quantization in Federated Learning (IEEE TSP 2023, IEEE ICASSP 2023, IEEE ISIT 20…☆18Oct 28, 2025Updated 4 months ago
- A pytorch implementation of the paper "Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage".☆62Oct 24, 2022Updated 3 years ago
- ☆26Dec 14, 2021Updated 4 years ago
- AutoML, Privacy Preserving, Federated Learning☆26Jun 8, 2023Updated 2 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆56May 28, 2019Updated 6 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- Federated learning with homomorphic encryption enables multiple parties to securely co-train artificial intelligence models in pathology …☆32Dec 7, 2023Updated 2 years ago
- Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"☆33Feb 28, 2022Updated 4 years ago
- reveal the vulnerabilities of SplitNN☆31Jun 16, 2022Updated 3 years ago
- ☆44Apr 25, 2023Updated 2 years ago
- ☆14May 17, 2024Updated last year
- FGLA: Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients☆14Dec 20, 2022Updated 3 years ago
- ☆18May 30, 2025Updated 9 months ago
- ☆11Nov 21, 2022Updated 3 years ago
- Secure Inference Resilient Against Malicious Clients☆15May 3, 2022Updated 3 years ago
- ☆10Apr 21, 2022Updated 3 years ago
- ☆14Dec 18, 2024Updated last year
- ☆20Feb 3, 2025Updated last year
- Implementation and results for ICTIR2021 paper: Effective and Privacy-preserving Federated Online Learning to Rank☆10Jul 24, 2021Updated 4 years ago
- ☆13Sep 12, 2021Updated 4 years ago
- In this project, we wish to identify psychiatric disorders through patient's speech☆12Jun 6, 2021Updated 4 years ago
- [TDSC 2025] Toward Robust and Accurate Adversarial Camouflage Generation against Vehicle Detectors☆14Aug 12, 2025Updated 6 months ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆38Oct 7, 2025Updated 4 months ago
- Tis is code for Few-Shot Joint Multimodal Entity-Relation Extraction via Knowledge-Enhanced Cross-modal Prompt Model (ACM MM 2024))☆12Aug 27, 2024Updated last year
- Speech Security and Privacy Compendium - Mini☆10Jun 18, 2024Updated last year
- Code for our ACL'23 paper on how to identify metaphor mappings with the help of GPT-3☆11May 21, 2025Updated 9 months ago
- Supplementary code for the paper "UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Lear…☆14Nov 10, 2022Updated 3 years ago
- ☆10Oct 18, 2021Updated 4 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- 《Python 编程从入门到实践》学习笔记整理☆13Nov 7, 2018Updated 7 years ago
- Security and Privacy Risk Simulator for Machine Learning (arXiv:2312.17667)☆422Jan 9, 2026Updated last month
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆85Nov 22, 2021Updated 4 years ago