☆19Jun 15, 2022Updated 3 years ago
Alternatives and similar repositories for ml-shuffling-amplification
Users that are interested in ml-shuffling-amplification are comparing it to the libraries listed below
Sorting:
- ☆14Nov 5, 2025Updated 3 months ago
- Implementation of "PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information"☆16Mar 21, 2023Updated 2 years ago
- This repository contains the official implementation for the ECCV'22 paper, "SPIN: An Empirical Evaluation on Sharing Parameters of Isotr…☆20Sep 9, 2023Updated 2 years ago
- Tune-Mode ConvBN Blocks For Efficient Transfer Learning☆18Aug 1, 2023Updated 2 years ago
- ☆20Feb 2, 2024Updated 2 years ago
- Amortized version of the differentially private SGD algorithm published in "Deep Learning with Differential Privacy" by Abadi et al. Enfo…☆43Apr 12, 2024Updated last year
- ☆26Aug 4, 2023Updated 2 years ago
- ☆23Oct 12, 2022Updated 3 years ago
- ☆29Jul 15, 2022Updated 3 years ago
- Test scripts related to Matter Certification☆17Nov 14, 2025Updated 3 months ago
- ☆34Jun 15, 2022Updated 3 years ago
- Javascript implementation of the Ristretto255 group operations, built on top of the popular TweetNaCl.js crypto library☆33Dec 13, 2023Updated 2 years ago
- This repository contains the code and instructions needed to reproduce the dataset splits for out paper "Speech Translation for Code-Swit…☆29Apr 8, 2022Updated 3 years ago
- ☆31Jan 29, 2024Updated 2 years ago
- ☆33Jun 15, 2022Updated 3 years ago
- Sample LDP implementation in Python☆128Jul 26, 2023Updated 2 years ago
- SCAN: A Structural Clustering Algorithm for Networks python implementation☆12Jun 11, 2015Updated 10 years ago
- ☆39Sep 6, 2023Updated 2 years ago
- ☆46Jul 25, 2024Updated last year
- ☆11Jul 29, 2022Updated 3 years ago
- ☆13Oct 6, 2020Updated 5 years ago
- A Python tool to manage and tag your bibliography (.bib and .pdf) files on Dropbox☆14Feb 14, 2026Updated 2 weeks ago
- ☆14Jan 6, 2024Updated 2 years ago
- Source code for the VLDB 2021 paper.☆11May 19, 2021Updated 4 years ago
- ☆12Feb 5, 2026Updated 3 weeks ago
- ☆48Apr 24, 2023Updated 2 years ago
- ☆49Oct 10, 2023Updated 2 years ago
- ☆11Jan 28, 2023Updated 3 years ago
- ☆10Aug 18, 2023Updated 2 years ago
- ☆13Apr 7, 2024Updated last year
- ☆10Oct 18, 2021Updated 4 years ago
- ☆75Dec 5, 2014Updated 11 years ago
- Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces☆14Sep 14, 2021Updated 4 years ago
- ☆10Mar 6, 2022Updated 3 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- A Julia implementation of the Paillier partially homomorphic encryption system☆12Oct 8, 2020Updated 5 years ago
- Robust Differentially Private Training of Deep Neural Networks☆12Dec 10, 2020Updated 5 years ago
- Common MPC Pitfalls☆12Feb 14, 2026Updated 2 weeks ago
- ☆42Nov 20, 2022Updated 3 years ago