ehsanul9511 / FLShieldLinks
☆16Updated last year
Alternatives and similar repositories for FLShield
Users that are interested in FLShield are comparing it to the libraries listed below
Sorting:
- ☆34Updated last year
- ☆53Updated 2 years ago
- ☆40Updated last year
- The official code of KDD22 paper "FLDetecotor: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clien…☆84Updated 2 years ago
- ☆24Updated last year
- reproduce the FLTrust model based on the paper "FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping"☆32Updated 2 years ago
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆40Updated 2 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆82Updated 2 years ago
- This is the code for our paper `Robust Federated Learning with Attack-Adaptive Aggregation' accepted by FTL-IJCAI'21.☆45Updated 2 years ago
- IBA: Towards Irreversible Backdoor Attacks in Federated Learning (Poster at NeurIPS 2023)☆37Updated last month
- Code for NDSS 2021 Paper "Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses Against Federated Learning"☆148Updated 3 years ago
- ☆38Updated 4 years ago
- ☆22Updated 2 years ago
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆61Updated 10 months ago
- Official implementation of "FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective"…☆43Updated 3 years ago
- Code for Data Poisoning Attacks Against Federated Learning Systems☆200Updated 4 years ago
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆43Updated last month
- PyTorch implementation of Security-Preserving Federated Learning via Byzantine-Sensitive Triplet Distance☆35Updated last year
- FedAvg code with privacy protection function, the application of Paillier homomorphic encryption algorithm and differential privacy, diff…☆129Updated last year
- ☆35Updated 3 years ago
- Backdoor detection in Federated learning with similarity measurement☆26Updated 3 years ago
- The code of the attack scheme in the paper "Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning"☆21Updated 2 years ago
- ☆43Updated 2 years ago
- nips23-Dynamic Personalized Federated Learning with Adaptive Differential Privacy☆84Updated last year
- Eluding Secure Aggregation in Federated Learning via Model Inconsistency☆12Updated 2 years ago
- Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization☆12Updated 4 years ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆42Updated last month
- ☆70Updated 3 years ago
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Updated 5 years ago
- ☆27Updated 2 years ago