Suyi32 / Learning-to-Detect-Malicious-Clients-for-Robust-FL
☆18Updated 4 years ago
Alternatives and similar repositories for Learning-to-Detect-Malicious-Clients-for-Robust-FL:
Users that are interested in Learning-to-Detect-Malicious-Clients-for-Robust-FL are comparing it to the libraries listed below
- Official implementation of "FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective"…☆39Updated 3 years ago
- ☆38Updated 4 years ago
- This is the code for our paper `Robust Federated Learning with Attack-Adaptive Aggregation' accepted by FTL-IJCAI'21.☆44Updated last year
- Adversarial attacks and defenses against federated learning.☆17Updated last year
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Updated 4 years ago
- A list of papers using/about Federated Learning especially malicious client and attacks.☆12Updated 4 years ago
- Federated Learning and Membership Inference Attacks experiments on CIFAR10☆21Updated 5 years ago
- Official Implementation of ICML'23 "Byzantine-Robust Learning on Heterogeneous Data via Gradient Splitting".☆14Updated last year
- Differentially Private Federated Learning: A Client Level Perspective☆12Updated 5 years ago
- ☆12Updated 2 years ago
- The code of the attack scheme in the paper "Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning"☆19Updated last year
- ☆36Updated last year
- The official code of KDD22 paper "FLDetecotor: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clien…☆82Updated 2 years ago
- ☆69Updated 2 years ago
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆26Updated last year
- ☆19Updated 2 years ago
- ☆23Updated last year
- Learning from history for Byzantine Robustness☆23Updated 3 years ago
- Official code for "Personalized Federated Learning through Local Memorization" (ICML'22)☆43Updated last year
- ☆31Updated 5 years ago
- Implementation of BapFL: You can Backdoor Attack Personalized Federated Learning☆13Updated last year
- ☆55Updated 2 years ago
- Official code repository for our accepted work "Gradient Driven Rewards to Guarantee Fairness in Collaborative Machine Learning" in NeurI…☆22Updated 7 months ago
- ☆54Updated 3 years ago
- ☆15Updated last year
- PyTorch implementation of Security-Preserving Federated Learning via Byzantine-Sensitive Triplet Distance☆33Updated 6 months ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆56Updated 2 years ago
- ☆13Updated 3 years ago
- The implementatioin code of paper: “A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning”☆11Updated last year
- An Empirical Study of Federated Unlearning: Efficiency and Effectiveness (Accepted Conference Track Papers at ACML 2023)☆17Updated last year