jinyuan-jia / AttriGuardView external linksLinks
☆24Dec 15, 2018Updated 7 years ago
Alternatives and similar repositories for AttriGuard
Users that are interested in AttriGuard are comparing it to the libraries listed below
Sorting:
- ☆25Jan 20, 2019Updated 7 years ago
- ☆45Nov 10, 2019Updated 6 years ago
- This repository contains the source code for "Membership Inference Attacks as Privacy Tools: Reliability, Disparity and Ensemble", In Pro…☆10Jan 2, 2026Updated last month
- Code for Membership Inference Attack against Machine Learning Models (in Oakland 2017)☆199Nov 15, 2017Updated 8 years ago
- ☆10Jan 18, 2022Updated 4 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- 这是一个面向币圈新手的入门速通指南集合,包括最全面的币圈区块链资源集合,包含各类工具导航,快速了解币圈常用术语和行话,详细的防骗指南,助你规避各类风险☆19Updated this week
- This repository contains all public data, python scripts, and documentation relating to NIST Public Safety Communications Research Divisi…☆11Nov 22, 2022Updated 3 years ago
- ☆13Mar 9, 2025Updated 11 months ago
- ☆11Jan 23, 2020Updated 6 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Translate PDF to ePub by Gemini☆20Jun 18, 2025Updated 7 months ago
- Code for ACL2018 paper "Learn How to Actively Learn: An Imitation Learning Approach"☆10Mar 8, 2019Updated 6 years ago
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- Code for ACL 2023 paper "A Close Look into the Calibration of Pre-trained Language Models"☆11May 9, 2023Updated 2 years ago
- ☆11Nov 14, 2020Updated 5 years ago
- 用python写的一些小代码☆11Feb 18, 2021Updated 4 years ago
- An Algorithm to Quantify Robustness of Recurrent Neural Networks☆49Apr 24, 2020Updated 5 years ago
- GUARDRAIL - MCP Security - Gateway for Unified Access, Resource Delegation, and Risk-Attenuating Information Limits☆17Jul 21, 2025Updated 6 months ago
- Python code to find Shapley Value of a Characteristic Form Game☆12Feb 19, 2020Updated 5 years ago
- This project proposed a method to defense against adversarial attack. By combining the proposed preprocessing method with an adversariall…☆10Oct 4, 2018Updated 7 years ago
- Jump ReLU☆11Apr 8, 2019Updated 6 years ago
- Trusted ML Pipeline Tutorial☆17Aug 7, 2019Updated 6 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Aug 17, 2023Updated 2 years ago
- Differentially Private Clustering in High-Dimensional Euclidean Spaces☆12Dec 30, 2017Updated 8 years ago
- DEPRECATED -- real-time co-operative LaTeX editing☆29Dec 15, 2011Updated 14 years ago
- A Python tool to visualize the global distribution of your academic citations.☆21Nov 24, 2025Updated 2 months ago
- End-to-End Learning from Complex Multigraphs with Latent-Graph Convolutional Networks☆15Jul 25, 2024Updated last year
- ☆14Dec 8, 2022Updated 3 years ago
- Docker image to run Neo4j with Gremlin Server / Console☆13Aug 6, 2019Updated 6 years ago
- Gremlin-Python tutorial☆14Nov 15, 2024Updated last year
- Robustness of DWT vs DCT is graded based on the quality of extracted watermark. The measure used is the Correlation coefficient (0-100%).…☆14Jan 4, 2024Updated 2 years ago
- Anomaly detection using RAG☆17Apr 22, 2024Updated last year
- ☆12Feb 7, 2017Updated 9 years ago
- ☆17Nov 30, 2022Updated 3 years ago
- Adversarial Images for Variational Autoencoders☆13Nov 30, 2016Updated 9 years ago
- Differentially private data release for data mining [SIGKDD 2011] - convert a relational data set into a differentially-private version w…☆16Sep 11, 2015Updated 10 years ago
- Displays the number of unread messages in your Office365 Mail inbox. You can also click the button to open your inbox.☆12Jun 7, 2019Updated 6 years ago
- privacy preserving deep learning☆15Sep 11, 2017Updated 8 years ago