facebookresearch / bounding_data_reconstructionLinks
Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".
☆11Updated 2 years ago
Alternatives and similar repositories for bounding_data_reconstruction
Users that are interested in bounding_data_reconstruction are comparing it to the libraries listed below
Sorting:
- ☆18Updated 3 years ago
 - ☆10Updated 3 years ago
 - ☆15Updated 2 years ago
 - Code for Auditing DPSGD☆37Updated 3 years ago
 - Algorithms for Privacy-Preserving Machine Learning in JAX☆107Updated this week
 - ☆19Updated 2 years ago
 - Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆39Updated 6 years ago
 - ☆32Updated last year
 - ☆23Updated 2 years ago
 - ☆80Updated 3 years ago
 - Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Updated last year
 - [CCS 2021] "DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation" by Boxin Wang*, Fan Wu*, Yunhui Long…☆38Updated 3 years ago
 - RAB: Provable Robustness Against Backdoor Attacks☆39Updated 2 years ago
 - ☆24Updated 3 years ago
 - Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆110Updated last year
 - This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Updated 3 years ago
 - Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆58Updated 2 years ago
 - R-GAP: Recursive Gradient Attack on Privacy [Accepted at ICLR 2021]☆37Updated 2 years ago
 - A unified benchmark problem for data poisoning attacks☆160Updated 2 years ago
 - Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆128Updated last year
 - Certified Removal from Machine Learning Models☆69Updated 4 years ago
 - code for model-targeted poisoning☆12Updated 2 years ago
 - ☆11Updated 4 years ago
 - The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Updated 5 years ago
 - A fast algorithm to optimally compose privacy guarantees of differentially private (DP) mechanisms to arbitrary accuracy.☆74Updated last year
 - ☆68Updated last year
 - Code for the paper: Label-Only Membership Inference Attacks☆66Updated 4 years ago
 - ☆26Updated 3 years ago
 - ☆66Updated 6 years ago
 - A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Updated 2 years ago