mmalekzadeh / honest-but-curious-nets
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)
☆17Updated 2 years ago
Alternatives and similar repositories for honest-but-curious-nets:
Users that are interested in honest-but-curious-nets are comparing it to the libraries listed below
- ☆44Updated last year
- ☆64Updated 4 years ago
- ☆24Updated 2 years ago
- ☆10Updated last year
- ☆45Updated 4 years ago
- ☆23Updated 2 years ago
- Code for ML Doctor☆88Updated 7 months ago
- ☆11Updated 2 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Updated 2 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆12Updated 4 years ago
- Code for the paper titled "Adversarial Vulnerability of Randomized Ensembles" (ICML 2022).☆10Updated 2 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- CaPC is a method that enables collaborating parties to improve their own local heterogeneous machine learning models in a setting where b…☆26Updated 3 years ago
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- ☆31Updated 7 months ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Updated last year
- ☆84Updated last year
- ☆11Updated 5 years ago
- Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".☆11Updated last year
- ☆9Updated 3 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 2 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 3 years ago
- ☆13Updated 2 years ago
- kyleliang919 / Uncovering-the-Connections-BetweenAdversarial-Transferability-and-Knowledge-Transferabilitycode for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Updated 2 years ago
- ☆25Updated 2 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆15Updated 3 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆36Updated 3 years ago
- ☆22Updated 2 years ago
- Privacy attacks on Split Learning☆38Updated 3 years ago
- ☆10Updated 3 years ago