ganeshdg95 / Leveraging-Adversarial-Examples-to-Quantify-Membership-Information-LeakageLinks
☆19Updated 2 years ago
Alternatives and similar repositories for Leveraging-Adversarial-Examples-to-Quantify-Membership-Information-Leakage
Users that are interested in Leveraging-Adversarial-Examples-to-Quantify-Membership-Information-Leakage are comparing it to the libraries listed below
Sorting:
- Code for the paper: Label-Only Membership Inference Attacks☆66Updated 4 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆48Updated 3 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆27Updated 3 years ago
- ☆32Updated last year
- ☆19Updated last year
- ☆26Updated 6 years ago
- ☆24Updated 2 years ago
- ☆26Updated 3 years ago
- Public implementation of the paper "On the Importance of Difficulty Calibration in Membership Inference Attacks".☆16Updated 3 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Updated 5 years ago
- verifying machine unlearning by backdooring☆20Updated 2 years ago
- ☆70Updated 3 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated 2 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 3 years ago
- ☆45Updated 5 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆39Updated 6 years ago
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆58Updated 6 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆44Updated 5 years ago
- Code for ML Doctor☆90Updated last year
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆49Updated 3 years ago
- Pytorch implementation of backdoor unlearning.☆21Updated 3 years ago
- ☆12Updated 2 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆110Updated last year
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆13Updated 4 years ago
- ☆20Updated last year
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 2 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆54Updated 6 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆35Updated 2 years ago
- ☆48Updated 4 years ago
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆36Updated last month