Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".
☆11Jun 16, 2023Updated 2 years ago
Alternatives and similar repositories for bounding_data_reconstruction
Users that are interested in bounding_data_reconstruction are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code repo for the paper "Privacy-aware Compression for Federated Data Analysis".☆19May 31, 2023Updated 2 years ago
- ☆20Jun 1, 2022Updated 3 years ago
- Computationally friendly hyper-parameter search with DP-SGD☆25Jan 7, 2025Updated last year
- This code reproduces the results of the paper, "Measuring Data Leakage in Machine-Learning Models with Fisher Information"☆49Aug 17, 2021Updated 4 years ago
- Post-processing for fair classification☆17Jun 30, 2025Updated 8 months ago
- ☆21Sep 21, 2021Updated 4 years ago
- Algorithms for Privacy-Preserving Machine Learning in JAX☆159Mar 16, 2026Updated last week
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- [NeurIPS 2023] Differentially Private Image Classification by Learning Priors from Random Processes☆12Jun 12, 2023Updated 2 years ago
- ☆28Nov 28, 2023Updated 2 years ago
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated 3 months ago
- A codebase that makes differentially private training of transformers easy.☆185Dec 9, 2022Updated 3 years ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆135Dec 8, 2022Updated 3 years ago
- ☆25Jun 22, 2023Updated 2 years ago
- Private Adaptive Optimization with Side Information (ICML '22)☆16Jun 23, 2022Updated 3 years ago
- Reproduction of Probabilistic binary neural networks☆10May 17, 2019Updated 6 years ago
- Code for the ICLR 2020 Paper, "A Theory of Usable Information under Computational Constraints"☆30Jul 8, 2020Updated 5 years ago
- ☆15Jun 5, 2023Updated 2 years ago
- ☆14Jul 26, 2020Updated 5 years ago
- An implementation of RC4, a software stream cipher.☆10Oct 9, 2019Updated 6 years ago
- ☆46Aug 4, 2023Updated 2 years ago
- ☆12Jul 16, 2020Updated 5 years ago
- 集成Ali和WeChat支付☆11Jul 12, 2025Updated 8 months ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Feb 15, 2020Updated 6 years ago
- ☆11Jun 5, 2015Updated 10 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- ☆12Oct 5, 2020Updated 5 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- 随便记录,基于springboot的java游戏服务器基础模板☆11Nov 20, 2024Updated last year
- ☆12Sep 26, 2019Updated 6 years ago
- Protocol Inspection and State Machine Analysis☆23May 26, 2018Updated 7 years ago
- Dahua NVR command line tool☆11Sep 8, 2020Updated 5 years ago
- GeekPlux's personal wiki☆18Jul 31, 2023Updated 2 years ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Jan 15, 2025Updated last year
- ☆13Feb 11, 2021Updated 5 years ago
- Real-Time High-Resolution Background Matting☆13Aug 26, 2021Updated 4 years ago
- A deep learning model for identifying and localizing vulnerabilities in C/C++ source code.☆12Jan 18, 2025Updated last year
- LibCP -- A Library for Conformal Prediction☆13Feb 26, 2015Updated 11 years ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Feb 26, 2026Updated 3 weeks ago