Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".
☆11Jun 16, 2023Updated 2 years ago
Alternatives and similar repositories for bounding_data_reconstruction
Users that are interested in bounding_data_reconstruction are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code repo for the paper "Privacy-aware Compression for Federated Data Analysis".☆18May 31, 2023Updated 2 years ago
- ☆20Jun 1, 2022Updated 3 years ago
- Computationally friendly hyper-parameter search with DP-SGD☆25Jan 7, 2025Updated last year
- This code reproduces the results of the paper, "Measuring Data Leakage in Machine-Learning Models with Fisher Information"☆48Aug 17, 2021Updated 4 years ago
- Post-processing for fair classification☆16Jun 30, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆21Sep 21, 2021Updated 4 years ago
- Algorithms for Privacy-Preserving Machine Learning in JAX☆168Apr 24, 2026Updated last week
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆12Jun 12, 2023Updated 2 years ago
- ☆28Nov 28, 2023Updated 2 years ago
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated 4 months ago
- A codebase that makes differentially private training of transformers easy.☆186Dec 9, 2022Updated 3 years ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆136Dec 8, 2022Updated 3 years ago
- ☆25Jun 22, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Reproduction of Probabilistic binary neural networks☆10May 17, 2019Updated 6 years ago
- Private Adaptive Optimization with Side Information (ICML '22)☆16Jun 23, 2022Updated 3 years ago
- Code for the ICLR 2020 Paper, "A Theory of Usable Information under Computational Constraints"☆30Jul 8, 2020Updated 5 years ago
- ☆15Jun 5, 2023Updated 2 years ago
- ☆14Jul 26, 2020Updated 5 years ago
- An implementation of RC4, a software stream cipher.☆10Oct 9, 2019Updated 6 years ago
- ☆45Aug 4, 2023Updated 2 years ago
- ☆12Jul 16, 2020Updated 5 years ago
- 集成Ali和WeChat支付☆11Jul 12, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Feb 15, 2020Updated 6 years ago
- ☆11Jun 5, 2015Updated 10 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- 随便记录,基于springboot的java游戏服务器基础模板☆11Nov 20, 2024Updated last year
- ☆11Oct 5, 2020Updated 5 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- ☆12Sep 26, 2019Updated 6 years ago
- Protocol Inspection and State Machine Analysis☆22May 26, 2018Updated 7 years ago
- Dahua NVR command line tool☆12Sep 8, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- GeekPlux's personal wiki☆18Apr 21, 2026Updated last week
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Apr 17, 2026Updated 2 weeks ago
- ☆13Feb 11, 2021Updated 5 years ago
- Real-Time High-Resolution Background Matting☆13Aug 26, 2021Updated 4 years ago
- A deep learning model for identifying and localizing vulnerabilities in C/C++ source code.☆12Jan 18, 2025Updated last year
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Feb 26, 2026Updated 2 months ago
- ☆29Sep 15, 2024Updated last year