eth-sri / dp-finderLinks
Differential Privacy Testing System
☆22Updated 5 years ago
Alternatives and similar repositories for dp-finder
Users that are interested in dp-finder are comparing it to the libraries listed below
Sorting:
- The released code of ReluVal in USENIX Security 2018☆60Updated 5 years ago
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆13Updated 2 years ago
- Statistical Counterexample Detector for Differential Privacy☆28Updated last year
- Duet: A Language for Differential Privacy☆16Updated 3 years ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆15Updated 2 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 3 years ago
- A machine-learning-based tool for discovering differential privacy violations in black-box algorithms.☆24Updated 3 years ago
- The released code of Neurify in NIPS 2018☆49Updated 2 years ago
- ☆102Updated 5 years ago
- The library for symbolic interval☆21Updated 5 years ago
- Safety Verification of Deep Neural Networks☆50Updated 7 years ago
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- Concolic Testing for Deep Neural Networks☆119Updated 4 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Updated last year
- Reward Guided Test Generation for Deep Learning☆21Updated last year
- Code from PLDI '21 paper "Provable Repair of Deep Neural Networks."☆10Updated 2 years ago
- The Charon tool for analyzing neural network robustness☆13Updated 5 years ago
- Code2Inv: Learning Loop Invariants for Program Verification☆98Updated 4 years ago
- Official implementation of ISSTA 2022 paper: MDPFuzz: Testing Models Solving Markov Decision Processes.☆24Updated 2 years ago
- Open source release from our ICLR 2020 paper, CLN2INV: Learning Loop Invariants with Continuous Logic Networks.☆21Updated 5 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆12Updated last year
- Privacy-preserving Federated Learning with Trusted Execution Environments☆74Updated 4 months ago
- ☆13Updated 7 years ago
- ☆10Updated last year
- ☆24Updated 4 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆170Updated 2 years ago
- ☆31Updated 3 years ago
- Neural Network Enumeration Tool☆34Updated last week
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆135Updated 2 years ago
- Code for Canonne-Kamath-Steinke paper https://arxiv.org/abs/2004.00010☆61Updated 5 years ago