Tongzhou0101 / NNSplitterLinks
This is the official implementation of NNSplitter (ICML'23)
☆11Updated last year
Alternatives and similar repositories for NNSplitter
Users that are interested in NNSplitter are comparing it to the libraries listed below
Sorting:
- Membership Inference Attacks and Defenses in Neural Network Pruning☆27Updated 3 years ago
- A pytorch implementation of the paper "Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage".☆60Updated 2 years ago
- ☆16Updated last year
- R-GAP: Recursive Gradient Attack on Privacy [Accepted at ICLR 2021]☆37Updated 2 years ago
- [NeurIPS 2021] "Drawing Robust Scratch Tickets: Subnetworks with Inborn Robustness Are Found within Randomly Initialized Networks" by Yon…☆13Updated 3 years ago
- ☆70Updated 3 years ago
- Surrogate Model Extension (SME): A Fast and Accurate Weight Update Attack on Federated Learning [Accepted at ICML 2023]☆14Updated last year
- ☆54Updated 2 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆19Updated 4 years ago
- [CCS 2021] "DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation" by Boxin Wang*, Fan Wu*, Yunhui Long…☆38Updated 3 years ago
- ☆24Updated 2 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆73Updated last year
- The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".☆34Updated 3 years ago
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆34Updated 2 years ago
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (ICML 2021)☆73Updated 4 years ago
- Recycling Model Updates in Federated Learning: Are Gradient Subspaces Low-Rank?☆14Updated 3 years ago
- ☆30Updated 5 years ago
- Pytorch implementation of Bit-Flip based adversarial weight Attack (BFA)☆33Updated 4 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Updated 3 years ago
- Compression primitives for uplink compression in Federated Learning that are compatible with Secure Aggregation.☆10Updated 3 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆35Updated 2 years ago
- Official Repository for ResSFL (accepted by CVPR '22)☆24Updated 3 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆57Updated 2 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆11Updated 3 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆66Updated 4 years ago
- ☆15Updated 2 years ago
- Official codes for "Understanding Deep Gradient Leakage via Inversion Influence Functions", NeurIPS 2023☆16Updated 2 years ago
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆61Updated 10 months ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆48Updated 3 years ago
- ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341☆74Updated 2 years ago