malaggan / heterogeneous-differential-privacyLinks
Implementation of the peer-to-peer simulation used for the experimental evaluation of the Heterogeneous Differential Privacy paper.
☆10Updated 5 years ago
Alternatives and similar repositories for heterogeneous-differential-privacy
Users that are interested in heterogeneous-differential-privacy are comparing it to the libraries listed below
Sorting:
- A Privacy Preserving Data Mining Platform☆46Updated 13 years ago
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆55Updated 4 years ago
- Differentially private data release for data mining [SIGKDD 2011] - convert a relational data set into a differentially-private version w…☆16Updated 10 years ago
- QGIS differential privacy processing plugin☆23Updated 9 years ago
- Federated Learning on XGBoost☆46Updated 6 years ago
- Applying differential privacy to movie recommendation system to guarantee the privacy of individual user ratings.☆11Updated 8 years ago
- ☆24Updated 7 years ago
- ☆42Updated 3 years ago
- Code for paper "Interpret Federated Learning with Shapley Values"☆40Updated 6 years ago
- ☆55Updated 6 years ago
- code for kaggle competition Microsoft malware classification☆41Updated 10 years ago
- cluster based generalization for k-anonymity☆30Updated 6 years ago
- Model extraction attacks on Machine-Learning-as-a-Service platforms.☆354Updated 5 years ago
- Differentially private learning on distributed data (NIPS 2017)☆12Updated 8 years ago
- Differential privacy protection based on Diffle-Hellman Key Exchange and AES256.☆10Updated 10 years ago
- Code for NIPS'2017 paper☆51Updated 5 years ago
- Secure collaborative training and inference for XGBoost.☆107Updated 3 years ago
- Repo for CS 259D: Data Mining for Cyber Security☆18Updated 11 years ago
- WAFFLE: Watermarking in Federated Learning☆23Updated 2 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆21Updated 6 years ago
- This work combines differential privacy and multi-party computation protocol to achieve distributed machine learning.☆26Updated 5 years ago
- Game-Theoretic Adversarial Machine Learning Library☆60Updated 7 years ago
- ☆29Updated 7 years ago
- Adversarial learning by utilizing model interpretation☆10Updated 7 years ago
- Catching Synchronized Behavior in Large Directed Graphs (KDD 2014)☆22Updated 10 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 6 years ago
- 基于《A Little Is Enough: Circumventing Defenses For Distributed Learning》的联邦学习攻击模型☆65Updated 5 years ago
- Differential Privacy Preservation in Deep Learning under Model Attacks☆135Updated 4 years ago
- ☆168Updated 8 years ago
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Updated 8 years ago