facebookresearch / bounding_data_reconstruction
Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".
☆11Updated last year
Alternatives and similar repositories for bounding_data_reconstruction:
Users that are interested in bounding_data_reconstruction are comparing it to the libraries listed below
- ☆18Updated 2 years ago
- ☆10Updated 2 years ago
- ☆31Updated 5 months ago
- ☆20Updated last year
- Repository for Knowledge Enhanced Machine Learning Pipeline (KEMLP)☆10Updated 3 years ago
- ☆11Updated 2 years ago
- Private Adaptive Optimization with Side Information (ICML '22)☆16Updated 2 years ago
- ☆24Updated 2 years ago
- ☆11Updated 2 years ago
- Code relative to "Adversarial robustness against multiple and single $l_p$-threat models via quick fine-tuning of robust classifiers"☆18Updated 2 years ago
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆55Updated 3 years ago
- Code for Auditing DPSGD☆37Updated 3 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆38Updated 6 years ago
- ☆33Updated last year
- [ICLR 2022] Boosting Randomized Smoothing with Variance Reduced Classifiers☆12Updated 2 years ago
- ☆13Updated last year
- Code repo for the paper "Privacy-aware Compression for Federated Data Analysis".☆17Updated last year
- ☆22Updated 2 years ago
- ☆36Updated 2 years ago
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆20Updated 10 months ago
- kyleliang919 / Uncovering-the-Connections-BetweenAdversarial-Transferability-and-Knowledge-Transferabilitycode for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Updated 2 years ago
- ☆23Updated last year
- [CVPR 2021] Scalability vs. Utility: Do We Have to Sacrifice One for the Other in Data Importance Quantification?☆33Updated 4 years ago
- Computationally friendly hyper-parameter search with DP-SGD☆24Updated last month
- ☆14Updated 4 years ago
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Updated 3 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆38Updated 6 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆21Updated 3 years ago
- ☆10Updated last year