bargavj / EvaluatingDPML
This project's goal is to evaluate the privacy leakage of differentially private machine learning models.
☆130Updated 2 years ago
Alternatives and similar repositories for EvaluatingDPML:
Users that are interested in EvaluatingDPML are comparing it to the libraries listed below
- A library for running membership inference attacks against ML models☆142Updated 2 years ago
- Differential Privacy Preservation in Deep Learning under Model Attacks☆132Updated 3 years ago
- simple Differential Privacy in PyTorch☆48Updated 4 years ago
- Code to reproduce experiments in "Antipodes of Label Differential Privacy PATE and ALIBI"☆30Updated 2 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆53Updated 5 years ago
- Analytic calibration for differential privacy with Gaussian perturbations☆46Updated 6 years ago
- Code for Membership Inference Attack against Machine Learning Models (in Oakland 2017)☆193Updated 7 years ago
- Concentrated Differentially Private Gradient Descent with Adaptive per-iteration Privacy Budget☆49Updated 6 years ago
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆125Updated 10 months ago
- Code to accompany the paper "Deep Learning with Gaussian Differential Privacy"☆49Updated 3 years ago
- autodp: A flexible and easy-to-use package for differential privacy☆270Updated last year
- Code for "Analyzing Federated Learning through an Adversarial Lens" https://arxiv.org/abs/1811.12470☆147Updated 2 years ago
- ☆80Updated 2 years ago
- Differentially Private Optimization for PyTorch 👁🙅♀️☆184Updated 4 years ago
- Code for NIPS'2017 paper☆49Updated 4 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆38Updated 6 years ago
- ☆45Updated 5 years ago
- Implementation of calibration bounds for differential privacy in the shuffle model☆23Updated 4 years ago
- ☆43Updated 3 years ago
- Differential private machine learning☆189Updated 3 years ago
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆58Updated 5 years ago
- ☆41Updated 3 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆102Updated 5 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆82Updated last year
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆58Updated 4 months ago
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (ICML 2021)☆71Updated 3 years ago
- ☆15Updated 5 years ago
- This work combines differential privacy and multi-party computation protocol to achieve distributed machine learning.☆26Updated 4 years ago
- Privacy attacks on Split Learning☆37Updated 3 years ago
- Code for Canonne-Kamath-Steinke paper https://arxiv.org/abs/2004.00010☆59Updated 4 years ago