☆16Aug 29, 2023Updated 2 years ago
Alternatives and similar repositories for rog
Users that are interested in rog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Membership Inference Attack on Federated Learning☆13Jan 14, 2022Updated 4 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆57May 4, 2023Updated 2 years ago
- ☆36Jan 5, 2022Updated 4 years ago
- Research into model inversion on SplitNN☆18Feb 20, 2024Updated 2 years ago
- PyTorch implementation of Joint Privacy Enhancement and Quantization in Federated Learning (IEEE TSP 2023, IEEE ICASSP 2023, IEEE ISIT 20…☆18Oct 28, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A pytorch implementation of the paper "Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage".☆61Oct 24, 2022Updated 3 years ago
- ☆12Sep 23, 2021Updated 4 years ago
- ☆26Dec 14, 2021Updated 4 years ago
- AutoML, Privacy Preserving, Federated Learning☆27Jun 8, 2023Updated 2 years ago
- Official codes for "Understanding Deep Gradient Leakage via Inversion Influence Functions", NeurIPS 2023☆15Oct 13, 2023Updated 2 years ago
- Breaching privacy in federated learning scenarios for vision and text☆319Jan 24, 2026Updated 3 months ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆56May 28, 2019Updated 6 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆13Sep 6, 2023Updated 2 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆33Jun 7, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Speech Security and Privacy Compendium - Mini☆10Jun 18, 2024Updated last year
- ☆11Nov 21, 2022Updated 3 years ago
- Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"☆33Feb 28, 2022Updated 4 years ago
- [KDD'21] Official PyTorch implementation for "Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data".☆13Sep 19, 2021Updated 4 years ago
- FGLA: Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients☆14Mar 17, 2026Updated last month
- Security and Privacy Risk Simulator for Machine Learning (arXiv:2312.17667)☆423Jan 9, 2026Updated 3 months ago
- ☆44Apr 25, 2023Updated 3 years ago
- Federated learning with homomorphic encryption enables multiple parties to securely co-train artificial intelligence models in pathology …☆32Dec 7, 2023Updated 2 years ago
- ☆12Oct 29, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆10Sep 14, 2023Updated 2 years ago
- This repo contains all the codes and sample files for the "Short and Long-term Pattern Discovery Over Large-Scale Geo-Spatiotemporal Data…☆13May 19, 2022Updated 3 years ago
- Tis is code for Few-Shot Joint Multimodal Entity-Relation Extraction via Knowledge-Enhanced Cross-modal Prompt Model (ACM MM 2024))☆12Aug 27, 2024Updated last year
- reveal the vulnerabilities of SplitNN☆31Jun 16, 2022Updated 3 years ago
- A web app that learns to repair your command line mistakes.☆15Jan 13, 2017Updated 9 years ago
- ☆17May 1, 2022Updated 4 years ago
- LLM for Index Recommendation☆17Mar 20, 2026Updated last month
- Dataset and code for ”EATN: An Efficient Adaptive Transfer Network for Aspect-level Sentiment Analysis"☆16Jun 22, 2021Updated 4 years ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆84Nov 22, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆20Feb 3, 2025Updated last year
- Image and text encryption using Shamir's Secret Sharing algorithm☆14Feb 17, 2020Updated 6 years ago
- Surrogate Model Extension (SME): A Fast and Accurate Weight Update Attack on Federated Learning [Accepted at ICML 2023]☆14Mar 31, 2024Updated 2 years ago
- Code and data for the ACM CIKM 2024 paper "Adversarial Text Rewriting for Text-aware Recommender Systems"☆12Aug 1, 2024Updated last year
- Privacy attacks on Split Learning☆45Nov 15, 2021Updated 4 years ago
- ☆18May 30, 2025Updated 11 months ago
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year