congxie1108 / icml2019_zenoLinks
☆16Updated 6 years ago
Alternatives and similar repositories for icml2019_zeno
Users that are interested in icml2019_zeno are comparing it to the libraries listed below
Sorting:
- Code for "Analyzing Federated Learning through an Adversarial Lens" https://arxiv.org/abs/1811.12470☆151Updated 2 years ago
- Robust aggregation for federated learning with the RFA algorithm.☆48Updated 2 years ago
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (ICML 2021)☆73Updated 3 years ago
- A sybil-resilient distributed learning protocol.☆105Updated last year
- A list of papers using/about Federated Learning especially malicious client and attacks.☆12Updated 4 years ago
- Code for NDSS 2021 Paper "Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses Against Federated Learning"☆147Updated 2 years ago
- 基于《A Little Is Enough: Circumventing Defenses For Distributed Learning》的联邦学习攻击模型☆63Updated 5 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆53Updated 6 years ago
- ☆54Updated 4 years ago
- This is the code for our paper `Robust Federated Learning with Attack-Adaptive Aggregation' accepted by FTL-IJCAI'21.☆45Updated 2 years ago
- ☆38Updated 4 years ago
- ☆55Updated 2 years ago
- DBA: Distributed Backdoor Attacks against Federated Learning (ICLR 2020)☆196Updated 3 years ago
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆26Updated 2 years ago
- Learning from history for Byzantine Robustness☆23Updated 4 years ago
- The official code of KDD22 paper "FLDetecotor: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clien…☆84Updated 2 years ago
- The code for "Improved Deep Leakage from Gradients" (iDLG).☆152Updated 4 years ago
- Code to accompany the paper "Deep Learning with Gaussian Differential Privacy"☆33Updated 4 years ago
- ☆70Updated 3 years ago
- ☆37Updated 3 years ago
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Updated 5 years ago
- ☆15Updated last year
- Concentrated Differentially Private Gradient Descent with Adaptive per-iteration Privacy Budget☆49Updated 7 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆57Updated 2 years ago
- ☆30Updated 5 years ago
- Code to reproduce experiments in "Antipodes of Label Differential Privacy PATE and ALIBI"☆32Updated 3 years ago
- The reproduction of the paper Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.☆62Updated 2 years ago
- Privacy attacks on Split Learning☆42Updated 3 years ago
- The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".☆34Updated 2 years ago
- Amortized version of the differentially private SGD algorithm published in "Deep Learning with Differential Privacy" by Abadi et al. Enfo…☆41Updated last year