Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)
☆50May 20, 2022Updated 3 years ago
Alternatives and similar repositories for UnlearningLeaks
Users that are interested in UnlearningLeaks are comparing it to the libraries listed below
Sorting:
- ☆12Aug 8, 2023Updated 2 years ago
- Official implementation of "Graph Unlearning" (ACM CCS 2022)☆53Jul 24, 2025Updated 7 months ago
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆24Mar 13, 2022Updated 3 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆71Feb 13, 2024Updated 2 years ago
- ☆199Sep 22, 2023Updated 2 years ago
- ☆29May 8, 2023Updated 2 years ago
- ☆15Dec 7, 2021Updated 4 years ago
- ☆16Sep 8, 2021Updated 4 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- This repository contains Python code for the paper "Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearni…☆19Apr 3, 2024Updated last year
- verifying machine unlearning by backdooring☆20Mar 25, 2023Updated 2 years ago
- SaTML'23 paper "Backdoor Attacks on Time Series: A Generative Approach" by Yujing Jiang, Xingjun Ma, Sarah Monazam Erfani, and James Bail…☆21Feb 5, 2023Updated 3 years ago
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆133Apr 9, 2024Updated last year
- This is a python script to generate nice bibtex file for latex.☆18Mar 1, 2020Updated 5 years ago
- Awesome Machine Unlearning (A Survey of Machine Unlearning)☆933Jan 13, 2026Updated last month
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- ☆21Sep 21, 2021Updated 4 years ago
- Existing Literature about Machine Unlearning☆945Aug 29, 2025Updated 5 months ago
- ☆59Jun 17, 2020Updated 5 years ago
- ☆18May 30, 2025Updated 8 months ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 3 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- Implementation of calibration bounds for differential privacy in the shuffle model☆21Nov 10, 2020Updated 5 years ago
- Certified Removal from Machine Learning Models☆69Aug 23, 2021Updated 4 years ago
- ☆27Oct 16, 2022Updated 3 years ago
- Convert pretrained RoBerta models to various long-document transformer models☆11Apr 5, 2022Updated 3 years ago
- final-project-level3-nlp-02 created by GitHub Classroom☆11Dec 31, 2021Updated 4 years ago
- ☆12Mar 25, 2020Updated 5 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆28Sep 19, 2023Updated 2 years ago
- ☆16Aug 31, 2021Updated 4 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆50Jul 2, 2025Updated 7 months ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- ☆83Aug 3, 2021Updated 4 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- [Deep Unlearning-PyTorch] Class Forgetting as in paper "Deep Unlearning: Fast and Efficient Training-free Approach to Controlled Forgetti…☆15Jul 26, 2024Updated last year
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆29Feb 8, 2021Updated 5 years ago
- Google 공식 Rouge Implementation을 한국어에서 사용할 수 있도록 처리☆18Jan 3, 2024Updated 2 years ago