☆48Dec 29, 2021Updated 4 years ago
Alternatives and similar repositories for gradient-inversion-generative-image-prior
Users that are interested in gradient-inversion-generative-image-prior are comparing it to the libraries listed below
Sorting:
- ☆11Mar 15, 2023Updated 3 years ago
- [CIKM'23] Test Time Embedding Normalization for Popularity Bias Mitigation☆13Jan 9, 2024Updated 2 years ago
- Official PyTorch implementation of "A Rotated Hyperbolic Wrapped Normal Distribution for Hierarchical Representation Learning"☆28Oct 12, 2022Updated 3 years ago
- Official PyTorch implementation of "Hyperbolic VAE via Latent Gaussian Distributions"☆23Oct 26, 2023Updated 2 years ago
- [AAAI 2023] Official implementation of 'Anonymization for Skeleton Action Recognition'☆29Dec 29, 2022Updated 3 years ago
- ☆22Sep 13, 2023Updated 2 years ago
- https://arxiv.org/abs/2111.00195☆16Mar 30, 2022Updated 3 years ago
- ☆15Mar 21, 2024Updated 2 years ago
- Graph generation with K2-trees (ICLR 2024)☆12Mar 19, 2024Updated 2 years ago
- ☆28Feb 19, 2024Updated 2 years ago
- A Simple and Scalable Representation for Graph Generation (ICLR 2024)☆22Mar 19, 2024Updated 2 years ago
- ☆11Jul 4, 2024Updated last year
- ☆11Jun 14, 2024Updated last year
- ☆36Jan 10, 2024Updated 2 years ago
- [ICCV 2023 Oral] Official implementation of "Robust Evaluation of Diffusion-Based Adversarial Purification"☆25Dec 3, 2023Updated 2 years ago
- R-GAP: Recursive Gradient Attack on Privacy [Accepted at ICLR 2021]☆37Feb 20, 2023Updated 3 years ago
- [ICCV-2023] Gradient inversion attack, Federated learning, Generative adversarial network.☆52Jul 13, 2024Updated last year
- FGLA: Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients☆14Updated this week
- The code for "Improved Deep Leakage from Gradients" (iDLG).☆166Mar 4, 2021Updated 5 years ago
- Breaching privacy in federated learning scenarios for vision and text☆316Jan 24, 2026Updated last month
- evently: simulation, fitting of Hawkes processes☆16Jan 22, 2023Updated 3 years ago
- Paper List for Gradient Inversion Attacks in Federated Learning [IEEE TPAMI 2026]☆31Mar 11, 2026Updated last week
- Experimental pipeline for FedFace.☆10Jul 6, 2021Updated 4 years ago
- ☆17Nov 10, 2025Updated 4 months ago
- A pytorch implementation of the paper "Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage".☆62Oct 24, 2022Updated 3 years ago
- GI-PIP: Do We Require Impractical Auxiliary Dataset for Gradient Inversion Attacks? (ICASSP 2024)☆16Apr 18, 2025Updated 11 months ago
- Code repo for the UAI 2023 paper "Learning To Invert: Simple Adaptive Attacks for Gradient Inversion in Federated Learning".☆16Jun 15, 2024Updated last year
- ☆10Apr 21, 2022Updated 3 years ago
- ☆15Jan 16, 2024Updated 2 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆57May 4, 2023Updated 2 years ago
- Code for "Don't trust your eyes: on the (un)reliability of feature visualizations" (ICML 2024)☆34Nov 15, 2023Updated 2 years ago
- ☆21Oct 25, 2021Updated 4 years ago
- Eluding Secure Aggregation in Federated Learning via Model Inconsistency☆13Mar 10, 2023Updated 3 years ago
- Code for reproducing experiments performed for Accoridon☆13Jun 11, 2021Updated 4 years ago
- The reproduction of the paper Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.☆63Feb 2, 2023Updated 3 years ago
- Security and Privacy Risk Simulator for Machine Learning (arXiv:2312.17667)☆422Jan 9, 2026Updated 2 months ago
- ☆10Jul 29, 2022Updated 3 years ago
- ☆14Dec 21, 2024Updated last year
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago