This repository contains Python code for the paper "Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning".
☆20Apr 3, 2024Updated 2 years ago
Alternatives and similar repositories for Unlearning-inversion-attacks
Users that are interested in Unlearning-inversion-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18May 30, 2025Updated 11 months ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆25Mar 13, 2022Updated 4 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- This repository contains a visual studio project for training a classifier on the mnist dataset using the libtorch c++ wrapper.☆12Oct 13, 2020Updated 5 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆57May 4, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- [ICML 2024] Codes for C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models☆18Jun 4, 2024Updated last year
- Instance-wise Batch Label Restoration via Gradients In Federated Learning (ICLR 2023)☆11May 18, 2023Updated 2 years ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆25Apr 2, 2024Updated 2 years ago
- ☆16Oct 9, 2024Updated last year
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆48Jul 18, 2025Updated 9 months ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆13Sep 6, 2023Updated 2 years ago
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- This repo contains information about FeB4RAG collection☆17Feb 19, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- ☆200Sep 22, 2023Updated 2 years ago
- ☆188Apr 22, 2026Updated last week
- Official code repository for the paper "Rethinking Model Prototyping through the MedMNIST+ Dataset Collection" @ Scientific Reports☆13Mar 5, 2025Updated last year
- Distributed Retrieval-Augmented Generation☆21May 1, 2025Updated 11 months ago
- ☆17Feb 6, 2024Updated 2 years ago
- GPU accelerated Perlin Noise in python☆11Oct 23, 2020Updated 5 years ago
- 用C++实现的简易ECC加密器☆10Jul 10, 2022Updated 3 years ago
- ☆16Jul 10, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- Camouflage poisoning via machine unlearning☆19Jul 3, 2025Updated 9 months ago
- LazyGNN: Large-Scale Graph Neural Networks via Lazy Propagation ICML_2023☆13Oct 27, 2023Updated 2 years ago
- ☆35Oct 4, 2021Updated 4 years ago
- Explore using "Conditional Neural Process" for clustering longitudinal data efficiently☆13Oct 7, 2018Updated 7 years ago
- [arXiv:2411.10023] "Model Inversion Attacks: A Survey of Approaches and Countermeasures"☆220Apr 3, 2026Updated 3 weeks ago
- Implementation of a network for Handwriting Synthesis based on the work of Generating Sequences With Recurrent Neural Networks by Alex Gr…☆11May 12, 2025Updated 11 months ago
- Dataset of 475000 faces from 530 faces (50x50 color) from facescrub☆19Aug 30, 2019Updated 6 years ago
- Source code for the paper 'Complex Hyperbolic Knowledge Graph Embeddings with Fast Fourier Transform'.☆12Nov 9, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Using VAEs to do clustering for classification☆11Nov 5, 2017Updated 8 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- Existing Literature about Machine Unlearning☆963Aug 29, 2025Updated 8 months ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- Code for Auditing Data Provenance in Text-Generation Models (in KDD 2019)☆10Jun 18, 2019Updated 6 years ago
- ☆12Aug 8, 2023Updated 2 years ago