TabLeak: Tabular Data Leakage in Federated Learning
☆18Jul 4, 2024Updated last year
Alternatives and similar repositories for tableak
Users that are interested in tableak are comparing it to the libraries listed below
Sorting:
- ☆20Feb 3, 2025Updated last year
- ☆12Jul 16, 2025Updated 8 months ago
- Self-Teaching Notes on Gradient Leakage Attacks against GPT-2 models.☆14Mar 18, 2024Updated 2 years ago
- FGLA: Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients☆14Updated this week
- ☆23May 9, 2024Updated last year
- Official code for "Federated learning for heterogeneous electronic health record systems with cost effective participant selection"☆12Feb 11, 2026Updated last month
- Constrained Decoding of Diffusion LLMs with Context-Free Grammars.☆43Dec 17, 2025Updated 3 months ago
- Official repo of Exploring the Adversarial Vulnerabilities of Vision-Language-Action Models in Robotics☆70Jan 27, 2026Updated last month
- ☆13May 17, 2025Updated 10 months ago
- Code for the CCS'22 paper "Federated Boosted Decision Trees with Differential Privacy"☆56Oct 19, 2023Updated 2 years ago
- Conditional Mutual Informaation Neural Estimator☆14Oct 23, 2020Updated 5 years ago
- ☆30Jun 28, 2025Updated 8 months ago
- A simple implementation of DP-RAG☆16Mar 17, 2025Updated last year
- ☆21Jul 21, 2025Updated 8 months ago
- Official code for "Rethinking Chain-of-Thought Reasoning for Videos"☆20Dec 14, 2025Updated 3 months ago
- VideoGPA is a self-supervised framework that enhances 3D consistency in Video Diffusion Models.☆42Updated this week
- A framework for evolving and testing question-answering datasets with various models.☆23Feb 28, 2024Updated 2 years ago
- ☆11Sep 19, 2025Updated 6 months ago
- ☆29Oct 8, 2025Updated 5 months ago
- Training Federated GANs with Theoretical Guarantees: AUniversal Aggregation Approach☆17Jan 18, 2021Updated 5 years ago
- Using Flower federated learning with scikit-learn random forest☆17Nov 28, 2023Updated 2 years ago
- R-GAP: Recursive Gradient Attack on Privacy [Accepted at ICLR 2021]☆37Feb 20, 2023Updated 3 years ago
- Course Material for the Tutorial on Privacy Enhancing Technologies and PPML☆13Oct 29, 2021Updated 4 years ago
- ☆14Jul 17, 2025Updated 8 months ago
- ☆40Sep 25, 2023Updated 2 years ago
- [NeurIPS 2024 / ICML 2025] LLM Quantization Attacks☆49Jan 15, 2026Updated 2 months ago
- The official repository for paper: BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via Objective-Decoupled Optimization☆45Dec 9, 2025Updated 3 months ago
- Agent-RRM: Exploring Reasoning Reward Model for Agents☆55Updated this week
- ☆18Mar 30, 2025Updated 11 months ago
- This repository contains the official implementation of the paper: "EHRStruct: A Comprehensive Benchmark Framework for Evaluating Large L…☆70Dec 18, 2025Updated 3 months ago
- DSN jailbreak Attack & Evaluation Ensemble☆17Feb 7, 2026Updated last month
- Representation Surgery for Multi-Task Model Merging. ICML, 2024.☆47Oct 10, 2024Updated last year
- Repository for the Paper: Refusing Safe Prompts for Multi-modal Large Language Models☆18Oct 16, 2024Updated last year
- [NeurIPS'25] The official code of "PeRL: Permutation-Enhanced Reinforcement Learning for Interleaved Vision-Language Reasoning"☆30Jan 12, 2026Updated 2 months ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Nov 15, 2020Updated 5 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Dec 10, 2021Updated 4 years ago
- Play around with NGBoost and compare with LightGBM and XGBoost☆20Jun 17, 2024Updated last year
- ☆18Feb 2, 2022Updated 4 years ago