Improved DP-SGD for optimizing
☆20Mar 23, 2019Updated 7 years ago
Alternatives and similar repositories for Improved-DP-SGD
Users that are interested in Improved-DP-SGD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Compressed SGD with Compressed Gradients in Pytorch☆13Jul 25, 2024Updated last year
- DP-HyperparamTuning offers an array of tools for fast and easy hypertuning of various hyperparameters for the DP-SGD algorithm.☆23Sep 27, 2021Updated 4 years ago
- ☆21Jun 10, 2020Updated 5 years ago
- ☆20Feb 17, 2020Updated 6 years ago
- Partial implementation of paper "DEEP GRADIENT COMPRESSION: REDUCING THE COMMUNICATION BANDWIDTH FOR DISTRIBUTED TRAINING"☆32Nov 20, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An Empirical Study of AI Techniques in Mobile Applications☆12May 28, 2024Updated last year
- ☆27Dec 15, 2022Updated 3 years ago
- Differentially Private Conditional Generative Adversarial Network☆31Oct 12, 2021Updated 4 years ago
- Amortized version of the differentially private SGD algorithm published in "Deep Learning with Differential Privacy" by Abadi et al. Enfo…☆44Apr 12, 2024Updated 2 years ago
- Code to accompany the paper "Deep Learning with Gaussian Differential Privacy"☆33Apr 29, 2021Updated 5 years ago
- Code for "Lightweight Blockchain-Empowered Secure and Efficient Federated Edge Learning", IEEE Transactions on Computers☆13Mar 12, 2026Updated 2 months ago
- On Robustness of Neural Ordinary Differential Equations☆11Oct 12, 2021Updated 4 years ago
- ☆10Dec 12, 2024Updated last year
- PBFT是经典的拜占庭容错算法,其不依赖同步性假设、以及显著高于同类算法的性能,达到了Pratical(实用)而广受推崇,也是目前联盟链中广泛采用的共识算法。本文结合理解对算法论文前5章做了释译。☆16Feb 1, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Leveraging network topology for better fake account detection in social networks☆10Jul 6, 2023Updated 2 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- The PackNet Continual Learning Method in Pytorch☆15Aug 19, 2021Updated 4 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- Deep Siamese convolutional neural net for biometric authentication of palm print images☆10Jul 3, 2024Updated last year
- Implementation of Privacy-Preserving Deep Learning via Additively Homomorphic Encryption (Using LWE schema)☆14Aug 16, 2018Updated 7 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆57May 4, 2023Updated 3 years ago
- ☆13Feb 11, 2019Updated 7 years ago
- Official implementation of Panacea: A foundation model for clinical trial design, recruitment, search, and summarization.☆19Dec 24, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Nov 27, 2019Updated 6 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- ☆13Dec 22, 2023Updated 2 years ago
- Implementation of LeNet-5 architecure on CPU and GPU using PyTorch☆18Apr 11, 2018Updated 8 years ago
- ☆12Dec 22, 2025Updated 4 months ago
- PyTorch implementation for OCT-GAN Neural ODE-based Conditional Tabular GANs (WWW 2021)☆15Oct 10, 2022Updated 3 years ago
- [TIP 2021] Layout-to-Image Translation with Double Pooling Generative Adversarial Networks☆18Feb 18, 2023Updated 3 years ago
- End-to-end Deep Linear Discriminant Analysis in Pytorch.☆18Mar 22, 2021Updated 5 years ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Dec 20, 2021Updated 4 years ago
- ☆24Nov 17, 2021Updated 4 years ago
- CoPur: Certifiably Robust Collaborative Inference via Feature Purification (NeurIPS 2022)☆11Dec 7, 2022Updated 3 years ago
- [ICCV 2025] LightsOut: Diffusion-based Outpainting for Enhanced Lens Flare Removal☆28Oct 20, 2025Updated 7 months ago
- Implementation for <Understanding Robust Overftting of Adversarial Training and Beyond> in ICML'22.☆13Jul 1, 2022Updated 3 years ago
- Bridge between TensorFlow and Google's Private Join and Compute library☆16Dec 27, 2022Updated 3 years ago
- fingerprint verification using convolution neural networks☆11Apr 3, 2018Updated 8 years ago