mmalekzadeh / honest-but-curious-nets
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)
☆17Updated 2 years ago
Alternatives and similar repositories for honest-but-curious-nets:
Users that are interested in honest-but-curious-nets are comparing it to the libraries listed below
- ☆64Updated 4 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Updated last year
- ☆44Updated 2 years ago
- ☆24Updated 2 years ago
- ☆9Updated 3 years ago
- ☆10Updated last year
- ☆25Updated 2 years ago
- Code for ML Doctor☆87Updated 8 months ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆12Updated 4 years ago
- ☆85Updated last year
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- ☆46Updated 4 years ago
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆15Updated 3 years ago
- ☆38Updated 3 years ago
- ☆22Updated 2 years ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆22Updated 3 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆77Updated last year
- Membership Inference Competition☆31Updated last year
- ☆144Updated 6 months ago
- ☆25Updated 2 years ago
- Code for the paper titled "Adversarial Vulnerability of Randomized Ensembles" (ICML 2022).☆10Updated 2 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Updated 2 years ago
- ☆11Updated 2 years ago
- ☆31Updated 7 months ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆21Updated 3 years ago
- Black-Box Ripper: Copying black-box models using generative evolutionary algorithms - NIPS 2020 - Official Implementation☆28Updated 4 years ago
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Updated 3 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆42Updated 3 years ago
- ☆13Updated 2 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆43Updated last year