liuyugeng / ML-Doctor
Code for ML Doctor
☆88Updated 6 months ago
Alternatives and similar repositories for ML-Doctor:
Users that are interested in ML-Doctor are comparing it to the libraries listed below
- Code for the paper: Label-Only Membership Inference Attacks☆64Updated 3 years ago
- ☆23Updated 2 years ago
- ☆45Updated 5 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆46Updated 2 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆48Updated 2 years ago
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆125Updated 11 months ago
- ☆24Updated 2 years ago
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆53Updated 3 months ago
- ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341☆70Updated last year
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆58Updated 5 months ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆82Updated 3 years ago
- ☆64Updated 4 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆29Updated 4 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆82Updated last year
- ☆31Updated 6 months ago
- ☆69Updated 2 years ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆50Updated 2 years ago
- Privacy attacks on Split Learning☆38Updated 3 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆69Updated last year
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Updated 6 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆32Updated last year
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆38Updated 2 months ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆83Updated 2 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆53Updated 5 years ago
- ☆44Updated 4 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆55Updated last year
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆58Updated 5 years ago
- ☆34Updated 3 years ago
- ☆79Updated 3 years ago