facebookresearch / whitebox_blackboxLinks
Public implementation of ICML'19 paper "White-box vs Black-box: Bayes Optimal Strategies for Membership Inference"
☆18Updated 5 years ago
Alternatives and similar repositories for whitebox_blackbox
Users that are interested in whitebox_blackbox are comparing it to the libraries listed below
Sorting:
- Code for Auditing DPSGD☆37Updated 3 years ago
- ☆32Updated last year
- ☆80Updated 3 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆39Updated 6 years ago
- Certified Removal from Machine Learning Models☆69Updated 4 years ago
- ☆24Updated 3 years ago
- ☆19Updated 2 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆67Updated 4 years ago
- ☆46Updated 6 years ago
- Code to reproduce experiments in "Antipodes of Label Differential Privacy PATE and ALIBI"☆32Updated 3 years ago
- ☆21Updated last year
- A unified benchmark problem for data poisoning attacks☆161Updated 2 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Updated 6 years ago
- ☆26Updated 4 years ago
- ☆66Updated 6 years ago
- ☆15Updated 2 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆111Updated last year
- Code for "Label-Consistent Backdoor Attacks"☆57Updated 5 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 3 years ago
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Updated 4 years ago
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆60Updated 6 years ago
- ☆54Updated 4 years ago
- ☆19Updated 3 years ago
- ConvexPolytopePosioning☆37Updated 6 years ago
- ☆22Updated 3 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆84Updated 2 years ago
- ☆10Updated 3 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Updated 5 years ago
- Code for Auditing Data Provenance in Text-Generation Models (in KDD 2019)☆10Updated 6 years ago