SunnierLee / DP-ImaGen
[USENIX Security 2024] PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining
☆15Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for DP-ImaGen
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Updated 2 years ago
- Official codes for "Understanding Deep Gradient Leakage via Inversion Influence Functions", NeurIPS 2023☆15Updated last year
- Code related to the paper "Machine Unlearning of Features and Labels"☆68Updated 9 months ago
- ☆23Updated last year
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆22Updated last year
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆31Updated 2 months ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆38Updated 3 months ago
- Marich is a model-agnostic extraction algorithm. It uses a public data to query a private model, aggregates the predicted labels, and con…☆7Updated last year
- Code for Backdoor Attacks Against Dataset Distillation☆30Updated last year
- This is an official repository for Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study (ICCV2023…☆20Updated last year
- THU-AIR Vertical Federated Learning general, extensible and light-weight framework☆85Updated 4 months ago
- Membership Inference Attack against Graph Neural Networks☆12Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆31Updated last year
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆46Updated 2 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆79Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆52Updated 8 months ago
- ☆65Updated 2 years ago
- [ICLR2024] "Backdoor Federated Learning by Poisoning Backdoor-Critical Layers"☆19Updated 10 months ago
- 🔒 Implementation of Shokri et al(2016) "Membership Inference Attacks against Machine Learning Models"☆30Updated 2 years ago
- ☆28Updated 2 years ago
- Vertical Federated Learning for Effectiveness, Security, Applicability: A Survey, by MARS Group at Wuhan University.☆11Updated 5 months ago
- The implementation of FedBCD algorithm published in the paper "FedBCD: A Communication-Efficient Collaborative Learning Framework for Dis…☆13Updated 4 months ago
- paper code☆22Updated 4 years ago
- ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341☆64Updated last year
- ☆12Updated last year
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆52Updated 5 years ago
- PromptFL: Let Federated Participants Cooperatively Learn Prompts Instead of Models — Federated Learning in Age of Foundation Model☆31Updated last year
- A pytorch implementation of the paper "Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage".☆57Updated 2 years ago
- 基于《A Little Is Enough: Circumventing Defenses For Distributed Learning》的联邦学习攻击模型☆61Updated 4 years ago
- ☆34Updated 3 years ago