This repository collects the latest research progress of Privacy-Preserving Recommender Systems after 2018.
☆30Nov 4, 2021Updated 4 years ago
Alternatives and similar repositories for Awesome-Privacy-Preserving-RS-Paper
Users that are interested in Awesome-Privacy-Preserving-RS-Paper are comparing it to the libraries listed below
Sorting:
- Federated Neural Collaborative Filtering (FedNCF). Neural Collaborative Filtering utilizes the flexibility, complexity, and non-linearity…☆44Apr 13, 2023Updated 2 years ago
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- The source code for the paper "LightFR: Lightweight Federated Recommendation with Privacy-preserving Matrix Factorization".☆18Dec 3, 2023Updated 2 years ago
- ☆20Aug 7, 2023Updated 2 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆19Jul 27, 2023Updated 2 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆20Oct 8, 2024Updated last year
- ☆27Oct 17, 2022Updated 3 years ago
- ☆21Sep 21, 2021Updated 4 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24May 21, 2022Updated 3 years ago
- 🔬 [ECML-PKDD'24] This is the source code and baselines of our paper FedHCDR: Federated Cross-Domain Recommendation with Hypergraph Signa…☆25May 28, 2024Updated last year
- A collection of research papers on Federated Recommender Systems.☆73Oct 21, 2024Updated last year
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- This is the code of ICLR 2022 Oral paper 'Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Au…☆30Oct 22, 2023Updated 2 years ago
- Code for CIKM 2021 paper: Differentially Private Federated Knowledge Graphs Embedding (https://arxiv.org/abs/2105.07615)☆34Dec 6, 2022Updated 3 years ago
- ☆36Apr 7, 2022Updated 3 years ago
- Code for ijcai-23 paper "Dual Personalization on Federated Recommendation"☆31Jul 28, 2024Updated last year
- ☆83Aug 3, 2021Updated 4 years ago
- ☆10Jan 18, 2022Updated 4 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 4 years ago
- A gamification solution for ESG stock portfolio ratings. 🌲🏙☆19May 25, 2022Updated 3 years ago
- Android Face Recognition uses Microsoft Project Oxford Face API for face detection and identification.☆13Nov 13, 2015Updated 10 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- ☆12Oct 5, 2022Updated 3 years ago
- It's a project combined with hardware and software, the goal is to make a smart watch based on esp8266 chip. The smart watch has so many …☆10Jul 9, 2019Updated 6 years ago
- The Code for "Federated Recommender with Additive Personalization"☆40May 28, 2025Updated 9 months ago
- ☆14Jun 15, 2023Updated 2 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆39Jun 14, 2023Updated 2 years ago
- ☆42Mar 11, 2022Updated 3 years ago
- The code for SAG-DTA: Prediction of Drug–Target Affinity Using Self-Attention Graph Network.☆11Dec 27, 2021Updated 4 years ago
- Injecting watermarks to protein sequences for privacy protection in biosecurity☆10Oct 1, 2024Updated last year
- This app for all kind of movie information. It's have everything about movie. I used The movie database API for all information . And I u…☆10Oct 22, 2020Updated 5 years ago
- Implementation of Inverse Propensity Matrix Factorization with Pytorch-Lightning☆12Sep 23, 2020Updated 5 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- ☆11Dec 29, 2022Updated 3 years ago
- Data.world load scripts☆12Sep 3, 2017Updated 8 years ago