SConsul / Adversarial_AttacksLinks
Course Project for EE782. IIT Bombay, Autumn 2019
☆7Updated 5 years ago
Alternatives and similar repositories for Adversarial_Attacks
Users that are interested in Adversarial_Attacks are comparing it to the libraries listed below
Sorting:
- ☆49Updated 4 years ago
- Papers I have collected and read in undergraduate and graduate period☆52Updated last year
- ☆29Updated 2 years ago
- federated-learning☆82Updated 2 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆131Updated 4 years ago
- ☆24Updated 3 years ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆275Updated 7 months ago
- Federated Learning Course Materials☆64Updated 4 years ago
- Federated Block Coordinate Descent (FedBCD) code for "Federated Block Coordinate Descent Scheme for Learning Global and Personalized Mode…☆16Updated 4 years ago
- ☆9Updated 4 years ago
- Comparison b/w Federated Learning & Split Learning for credit card fraud detection dataset using Pytorch☆18Updated 3 years ago
- Homomorphic Encryption and Federated Learning based Privacy-Preserving☆71Updated 2 years ago
- Supervised Learning approach to Detect Anomalies in Blockchain using Federated Learning☆34Updated 5 years ago
- Code for ML Doctor☆91Updated 11 months ago
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Updated 5 years ago
- A Federated Learning based Android Malware Classification System☆27Updated last year
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆210Updated 3 years ago
- Federated k-means clustering algorithm implementation and proof of concept.☆32Updated 3 years ago
- 😎 A curated list of awesome real-world adversarial examples resources☆59Updated 4 years ago
- ☆11Updated 3 years ago
- The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0☆28Updated last year
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆50Updated 2 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆117Updated 6 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆84Updated 2 years ago
- I put all my exploration around AI in reproducible notebooks in this repository☆91Updated last week
- FL-based intrusion detection system development using model averaging.☆39Updated 2 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- A demo of vertical federated learning on simple datasets☆23Updated 4 years ago
- A Python library for Secure and Explainable Machine Learning☆183Updated 3 weeks ago
- Code for "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples" (NDSS 2020)☆20Updated 4 years ago