RUCAIBox / Awesome-Privacy-Preserving-RS-PaperView external linksLinks
This repository collects the latest research progress of Privacy-Preserving Recommender Systems after 2018.
☆30Nov 4, 2021Updated 4 years ago
Alternatives and similar repositories for Awesome-Privacy-Preserving-RS-Paper
Users that are interested in Awesome-Privacy-Preserving-RS-Paper are comparing it to the libraries listed below
Sorting:
- This repository collects the latest research progress of Privacy-Preserving Recommender Systems after 2018.☆23Nov 4, 2021Updated 4 years ago
- A project for collecting and showing the current research progress of FedRec☆142Oct 17, 2023Updated 2 years ago
- Federated Neural Collaborative Filtering (FedNCF). Neural Collaborative Filtering utilizes the flexibility, complexity, and non-linearity…☆43Apr 13, 2023Updated 2 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- Implementation of the peer-to-peer simulation used for the experimental evaluation of the Heterogeneous Differential Privacy paper.☆10Jul 5, 2020Updated 5 years ago
- ☆20Aug 7, 2023Updated 2 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆19Jul 27, 2023Updated 2 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆20Oct 8, 2024Updated last year
- ☆21Sep 21, 2021Updated 4 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- 🔬 [ECML-PKDD'24] This is the source code and baselines of our paper FedHCDR: Federated Cross-Domain Recommendation with Hypergraph Signa…☆25May 28, 2024Updated last year
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24May 21, 2022Updated 3 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- Papers related to federated learning for recommender system☆32Apr 25, 2021Updated 4 years ago
- This is the code of ICLR 2022 Oral paper 'Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Au…☆30Oct 22, 2023Updated 2 years ago
- Code for CIKM 2021 paper: Differentially Private Federated Knowledge Graphs Embedding (https://arxiv.org/abs/2105.07615)☆34Dec 6, 2022Updated 3 years ago
- Code for ijcai-23 paper "Dual Personalization on Federated Recommendation"☆31Jul 28, 2024Updated last year
- ☆83Aug 3, 2021Updated 4 years ago
- ☆12Oct 5, 2022Updated 3 years ago
- ☆10Jan 18, 2022Updated 4 years ago
- ☆11Mar 31, 2022Updated 3 years ago
- It's a project combined with hardware and software, the goal is to make a smart watch based on esp8266 chip. The smart watch has so many …☆10Jul 9, 2019Updated 6 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 3 years ago
- The Code for "Federated Recommender with Additive Personalization"☆40May 28, 2025Updated 8 months ago
- MiranDa: Mimicking the learning process of human doctors to achieve causal inference for medication recommendation☆13Jan 19, 2026Updated 3 weeks ago
- A gamification solution for ESG stock portfolio ratings. 🌲🏙☆19May 25, 2022Updated 3 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆38Jun 14, 2023Updated 2 years ago
- ☆41Mar 11, 2022Updated 3 years ago
- ☆42Nov 24, 2023Updated 2 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆14Mar 29, 2024Updated last year
- ☆25Jul 9, 2025Updated 7 months ago
- Data.world load scripts☆12Sep 3, 2017Updated 8 years ago
- Implementation of Inverse Propensity Matrix Factorization with Pytorch-Lightning☆12Sep 23, 2020Updated 5 years ago
- A sentiment analysis of the image and the corresponding text comment, which is based on the convolution neural network (CNN).☆11May 27, 2017Updated 8 years ago
- ☆11Nov 30, 2025Updated 2 months ago