mmalekzadeh / honest-but-curious-nets
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)
☆17Updated last year
Related projects ⓘ
Alternatives and complementary repositories for honest-but-curious-nets
- ☆23Updated last year
- ☆44Updated 3 years ago
- ☆43Updated last year
- ☆16Updated 2 years ago
- ☆12Updated 7 months ago
- ☆10Updated last year
- ☆62Updated 4 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆20Updated 3 years ago
- ☆23Updated 2 years ago
- Code for ML Doctor☆86Updated 3 months ago
- Code repo for the paper "Privacy-aware Compression for Federated Data Analysis".☆16Updated last year
- Code for "Differential Privacy Has Disparate Impact on Model Accuracy" NeurIPS'19☆34Updated 3 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Updated 2 years ago
- ☆32Updated 2 months ago
- ☆11Updated 2 years ago
- Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".☆10Updated last year
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆31Updated 2 years ago
- kyleliang919 / Uncovering-the-Connections-BetweenAdversarial-Transferability-and-Knowledge-Transferabilitycode for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Updated last year
- Code for the paper titled "Adversarial Vulnerability of Randomized Ensembles" (ICML 2022).☆10Updated 2 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆42Updated 3 years ago
- ☆11Updated 4 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Updated 3 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆38Updated 5 years ago
- ☆23Updated last year
- ☆44Updated 3 years ago
- ☆13Updated 2 years ago
- ☆22Updated last year
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆22Updated 2 years ago
- ☆83Updated last year
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago