☆24Dec 15, 2018Updated 7 years ago
Alternatives and similar repositories for AttriGuard
Users that are interested in AttriGuard are comparing it to the libraries listed below
Sorting:
- ☆25Jan 20, 2019Updated 7 years ago
- ☆45Nov 10, 2019Updated 6 years ago
- TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations☆20Dec 27, 2020Updated 5 years ago
- This repository contains the source code for "Membership Inference Attacks as Privacy Tools: Reliability, Disparity and Ensemble", In Pro…☆10Jan 2, 2026Updated 2 months ago
- ☆11May 25, 2023Updated 2 years ago
- Code for Membership Inference Attack against Machine Learning Models (in Oakland 2017)☆199Nov 15, 2017Updated 8 years ago
- ☆10Jan 18, 2022Updated 4 years ago
- ☆12Sep 26, 2024Updated last year
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- 这是一个面向币圈新手的入门速通指南集合,包括最全面的币圈区块链资源集合,包含各类工具导航,快速了解币圈常用术语和行话,详细的防骗指南,助你规避各类风险☆19Feb 10, 2026Updated last month
- ☆14Mar 9, 2025Updated last year
- ☆11Jan 23, 2020Updated 6 years ago
- ☆12Oct 16, 2024Updated last year
- ☆19May 14, 2025Updated 9 months ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Translate PDF to ePub by Gemini☆19Jun 18, 2025Updated 8 months ago
- ☆11Feb 22, 2019Updated 7 years ago
- Code for ACL2018 paper "Learn How to Actively Learn: An Imitation Learning Approach"☆10Mar 8, 2019Updated 7 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- Assessing Disparate Impacts of Personalized Interventions: Identifiability and Bounds☆11Oct 28, 2019Updated 6 years ago
- Code for ACL 2023 paper "A Close Look into the Calibration of Pre-trained Language Models"☆11May 9, 2023Updated 2 years ago
- An Algorithm to Quantify Robustness of Recurrent Neural Networks☆49Apr 24, 2020Updated 5 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Aug 17, 2023Updated 2 years ago
- DEPRECATED -- real-time co-operative LaTeX editing☆29Dec 15, 2011Updated 14 years ago
- Deploy a Custom Machine Learning engine and Monitor Payload Logging and Fairness using AI OpenScale☆12Sep 17, 2025Updated 5 months ago
- Paper to Reviewer Assignment is a tedious but a very crucial job for conference organizers. Till date the Toronto Paper Matching System (…☆10Nov 30, 2017Updated 8 years ago
- This project proposed a method to defense against adversarial attack. By combining the proposed preprocessing method with an adversariall…☆10Oct 4, 2018Updated 7 years ago
- This is the Python implementation of DIANA Clustering Algorithm☆14Mar 31, 2018Updated 7 years ago
- Jump ReLU☆11Apr 8, 2019Updated 6 years ago
- Trusted ML Pipeline Tutorial☆17Aug 7, 2019Updated 6 years ago
- GUARDRAIL - MCP Security - Gateway for Unified Access, Resource Delegation, and Risk-Attenuating Information Limits☆17Jul 21, 2025Updated 7 months ago
- Gremlin-Python tutorial☆14Nov 15, 2024Updated last year
- End-to-End Learning from Complex Multigraphs with Latent-Graph Convolutional Networks☆15Jul 25, 2024Updated last year
- A2A MCP Server is a lightweight Python bridge that lets Claude Desktop or any MCP client talk to A2A agents. It provides three tools: reg…☆21May 4, 2025Updated 10 months ago
- Robustness of DWT vs DCT is graded based on the quality of extracted watermark. The measure used is the Correlation coefficient (0-100%).…☆14Jan 4, 2024Updated 2 years ago
- Collapsed Gibbs sampling for Latent Dirichlet Allocation☆18Jun 11, 2012Updated 13 years ago
- Docker image to run Neo4j with Gremlin Server / Console☆13Aug 6, 2019Updated 6 years ago
- IotSan: Fortifying the Safety of IoT Systems (ACM CoNEXT'18)☆14Jan 30, 2019Updated 7 years ago
- Analyze who cites you, where, and how—one-click impact report for grants, tenure, and academic green cards☆33Nov 30, 2025Updated 3 months ago