eth-sri / dp-finderView external linksLinks
Differential Privacy Testing System
☆22Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for dp-finder
Users that are interested in dp-finder are comparing it to the libraries listed below
Sorting:
- Statistical Counterexample Detector for Differential Privacy☆28Apr 4, 2024Updated last year
- A machine-learning-based tool for discovering differential privacy violations in black-box algorithms.☆24May 26, 2022Updated 3 years ago
- ☆10Mar 31, 2023Updated 2 years ago
- Quantifying Differential Privacy under Temporal Correlations☆12May 13, 2023Updated 2 years ago
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆16Aug 24, 2020Updated 5 years ago
- Fuzzer and generator for string and regex problems in SMT-LIB 2.x format.☆22Dec 17, 2021Updated 4 years ago
- Code for NIPS'2017 paper☆51Jul 16, 2020Updated 5 years ago
- MachSMT: An ML-Driven Algorithm Selection tool for SMT Solvers☆25Apr 21, 2023Updated 2 years ago
- An arbitrary-precision differentiable programming language.☆36Jul 7, 2023Updated 2 years ago
- The MemCAD static analyzer☆27Oct 15, 2021Updated 4 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 4 years ago
- A Fast Floating-Point Satisfiability Solver☆28Jul 26, 2025Updated 6 months ago
- Repository for the EDBT'23 paper "Frequency Estimation of Evolving Data Under Local Differential Privacy".☆12Aug 1, 2023Updated 2 years ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆135Dec 8, 2022Updated 3 years ago
- Source code for the VLDB 2021 paper.☆11May 19, 2021Updated 4 years ago
- zkSnark circuit compiler☆12Jan 8, 2026Updated last month
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- A template for creating new SBTs inheriting from the Masa SBT smart contracts, using ZKP.☆11Nov 25, 2024Updated last year
- ☆13Oct 6, 2020Updated 5 years ago
- Solver for Constrained Horn Clauses☆50Feb 6, 2026Updated last week
- Documentation☆44Nov 2, 2025Updated 3 months ago
- Code accompanying the paper "Disparate Impact in Differential Privacy from Gradient Misalignment".☆11Apr 4, 2023Updated 2 years ago
- ☆12Nov 26, 2019Updated 6 years ago
- Automatically run experiments, upload results to google docs, analyze them using R, and include the analysis in LaTeX.☆18Mar 3, 2015Updated 10 years ago
- Prototype of the system described in "Trace Types and Denotational Semantics for Sound Programmable Inference in Probabilistic Languages"☆11Aug 8, 2025Updated 6 months ago
- 百度商业AI技术创新大赛赛道二:广告图片描述生成 Rank3方案分享☆11Oct 9, 2024Updated last year
- Tool for algorithmic complexity analysis based on symbolic execution☆10Sep 17, 2018Updated 7 years ago
- egraph on top of sqlite☆13Mar 8, 2022Updated 3 years ago
- Library built from scratch to implement zk-protocols☆13Dec 13, 2023Updated 2 years ago
- オリジナルの漢字テストを作成するWebアプリ☆12Mar 5, 2024Updated last year
- NeonGoby alias analysis checker☆14Jul 2, 2013Updated 12 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- DAI: Demanded Abstract Interpretation☆16Sep 23, 2024Updated last year
- ☆43Jul 6, 2023Updated 2 years ago
- Dynamic analysis of multithreaded C programs☆13Feb 7, 2020Updated 6 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- FPsolve: solver for polynomial equations over omega-continuous semirings☆11Aug 15, 2015Updated 10 years ago
- ☆11Nov 27, 2024Updated last year
- typesafe implementation of tensor algebra in Haskell☆13Feb 27, 2021Updated 4 years ago