Code for USENIX Security 2023 Paper "Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks"
☆21May 19, 2024Updated last year
Alternatives and similar repositories for FRL
Users that are interested in FRL are comparing it to the libraries listed below
Sorting:
- ☆10Jul 22, 2024Updated last year
- This is the repository for the work "An ensemble mechanism to tackle the heterogeneity in asynchronous federated learning"☆11Nov 19, 2021Updated 4 years ago
- Multi-metrics adaptively identifies backdoors in Federated learning☆37Aug 7, 2025Updated 6 months ago
- ☆17Jun 10, 2024Updated last year
- ☆54Jun 30, 2023Updated 2 years ago
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆29Jun 29, 2023Updated 2 years ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆29Nov 19, 2023Updated 2 years ago
- Official Implementation for: "RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images (Videos) with Provable Gu…☆36Oct 30, 2024Updated last year
- [INFOCOM24' & TDSC25']FedPHE & Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning☆41Aug 31, 2025Updated 6 months ago
- ☆11Dec 23, 2024Updated last year
- Codes for Dual Stealthy Backdoor☆14Feb 10, 2024Updated 2 years ago
- ☆31Oct 10, 2023Updated 2 years ago
- ☆12May 6, 2022Updated 3 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆33Sep 23, 2023Updated 2 years ago
- The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".☆35Oct 3, 2022Updated 3 years ago
- A secure aggregation system for private federated learning☆49May 13, 2024Updated last year
- ☆37Dec 23, 2025Updated 2 months ago
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆41Apr 3, 2023Updated 2 years ago
- Official Implementation of "Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning"☆12Feb 10, 2025Updated last year
- BrainWash: A Poisoning Attack to Forget in Continual Learning☆12Apr 15, 2024Updated last year
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 10 months ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆43Sep 9, 2025Updated 5 months ago
- ST-NILM is a new integrated architecture based on the Scattering Transform. It has a DCN (Deep Convolutional Network) with analytical wav…☆12Mar 2, 2024Updated 2 years ago
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆13Dec 16, 2024Updated last year
- Create reliability diagrams to quantify ML calibration.☆10Feb 1, 2022Updated 4 years ago
- The current notebook implements a simple disaggregator for deep-nilmtk models compatible with NILMtk.☆11Jan 14, 2023Updated 3 years ago
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- ☆10May 31, 2023Updated 2 years ago
- Extract features from recorded EEG signal to detect driver fatigue with an ML/DL Hybrid Classifier☆15Jun 15, 2020Updated 5 years ago
- Toolkit in Python for the acquisition, analysis and visualization of motion capture using IMU☆14May 19, 2021Updated 4 years ago
- Implementation of: Kristiadi, Agustinus, and Asja Fischer. "Predictive Uncertainty Quantification with Compound Density Networks." (2019)…☆16May 26, 2022Updated 3 years ago
- ☆13Jul 14, 2025Updated 7 months ago
- Blockchain-based Federated Learning Utilizing Zero-Knowledge Proofs for Verifiable Training and Aggregation☆14Dec 26, 2024Updated last year
- [ICLR 2022] Boosting Randomized Smoothing with Variance Reduced Classifiers☆12Mar 29, 2022Updated 3 years ago
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆39Updated this week
- Byzantine-resilient distributed SGD with TensorFlow.☆40Jan 22, 2021Updated 5 years ago
- ☆14Feb 26, 2025Updated last year
- ☆14Mar 9, 2025Updated 11 months ago
- ☆11Apr 4, 2022Updated 3 years ago