malaggan / heterogeneous-differential-privacy
Implementation of the peer-to-peer simulation used for the experimental evaluation of the Heterogeneous Differential Privacy paper.
☆10Updated 4 years ago
Alternatives and similar repositories for heterogeneous-differential-privacy:
Users that are interested in heterogeneous-differential-privacy are comparing it to the libraries listed below
- Differentially private data release for data mining [SIGKDD 2011] - convert a relational data set into a differentially-private version w…☆16Updated 9 years ago
- QGIS differential privacy processing plugin☆22Updated 8 years ago
- A Privacy Preserving Data Mining Platform☆46Updated 12 years ago
- [ICML 2019, 20 min long talk] Robust Decision Trees Against Adversarial Examples☆67Updated 2 years ago
- ☆32Updated 7 years ago
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆53Updated 3 years ago
- ☆23Updated 6 years ago
- ☆43Updated 3 years ago
- This work combines differential privacy and multi-party computation protocol to achieve distributed machine learning.☆26Updated 4 years ago
- cluster based generalization for k-anonymity☆29Updated 5 years ago
- Adversarial learning by utilizing model interpretation☆10Updated 6 years ago
- Analytic calibration for differential privacy with Gaussian perturbations☆46Updated 6 years ago
- Python package to create adversarial agents for membership inference attacks againts machine learning models☆46Updated 5 years ago
- Applying differential privacy to movie recommendation system to guarantee the privacy of individual user ratings.☆10Updated 7 years ago
- Code for NIPS'2017 paper☆49Updated 4 years ago
- The raw mondrian is designed for numerical attributes. When comes to categorical attributes, Mondrian needs to transform categorical attr…☆34Updated last year
- ☆8Updated 7 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆18Updated 5 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆101Updated 5 years ago
- ☆28Updated 3 years ago
- Inferring Strange Behavior from Connectivity Pattern (PAKDD 2014, KAIS 2015)☆10Updated 9 years ago
- Differential privacy protection based on Diffle-Hellman Key Exchange and AES256.☆9Updated 9 years ago
- Source code of paper "Differentially Private Generative Adversarial Network"☆68Updated 6 years ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆130Updated 2 years ago
- ☆7Updated 8 years ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16Updated 10 years ago
- Differentially private learning on distributed data (NIPS 2017)☆12Updated 7 years ago
- Federated Learning on XGBoost☆46Updated 5 years ago
- ☆26Updated 6 years ago
- A TensorFlow (Python 3) implementation of a differentially-private-GAN.☆20Updated 4 years ago