SunnierLee / DP-ImaGenLinks
[USENIX Security 2024] PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining
☆22Updated 8 months ago
Alternatives and similar repositories for DP-ImaGen
Users that are interested in DP-ImaGen are comparing it to the libraries listed below
Sorting:
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Updated 2 years ago
- Official codes for "Understanding Deep Gradient Leakage via Inversion Influence Functions", NeurIPS 2023☆16Updated last year
- The code of "dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis"☆18Updated last year
- Code related to the paper "Machine Unlearning of Features and Labels"☆70Updated last year
- [CCS 2025] DPImageBench is an open-source toolkit developed to facilitate the research and application of DP image synthesis.☆21Updated 2 weeks ago
- Code for Backdoor Attacks Against Dataset Distillation☆35Updated 2 years ago
- [ICLR2024] "Backdoor Federated Learning by Poisoning Backdoor-Critical Layers"☆38Updated 7 months ago
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆38Updated 10 months ago
- This is an official repository for Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study (ICCV2023…☆23Updated last year
- ☆20Updated last year
- 🔒 Implementation of Shokri et al(2016) "Membership Inference Attacks against Machine Learning Models"☆36Updated 2 years ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆42Updated 11 months ago
- ☆40Updated 3 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆31Updated last year
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆60Updated 6 years ago
- ☆44Updated 3 years ago
- Methods for removing learned data from neural nets and evaluation of those methods☆36Updated 4 years ago
- [MM '24] EvilEdit: Backdooring Text-to-Image Diffusion Models in One Second☆22Updated 8 months ago
- ☆26Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆57Updated last year
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆32Updated 11 months ago
- ☆13Updated last year
- A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.☆179Updated 3 months ago
- [KDD 2022] "Bilateral Dependency Optimization: Defending Against Model-inversion Attacks"☆23Updated 3 months ago
- ☆25Updated 2 years ago
- [MM'23 Oral] "Text-to-image diffusion models can be easily backdoored through multimodal data poisoning"☆29Updated 4 months ago
- The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".☆34Updated 2 years ago
- [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆182Updated last month
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆48Updated 3 years ago
- ☆24Updated last year