mmalekzadeh / privacy-preserving-bandits
Privacy-Preserving Bandits (MLSys'20)
☆23Updated 2 years ago
Alternatives and similar repositories for privacy-preserving-bandits:
Users that are interested in privacy-preserving-bandits are comparing it to the libraries listed below
- ☆17Updated 4 years ago
- The code reproduces the results of the experiments in the paper. In particular, it performs experiments in which machine-learning models …☆20Updated 3 years ago
- A concise primer on Differential Privacy☆28Updated 4 years ago
- 📰 Computing the information content of trained neural networks☆21Updated 3 years ago
- Implements EvoNorms B0 and S0 as proposed in Evolving Normalization-Activation Layers.☆11Updated 4 years ago
- ☆36Updated 2 years ago
- Code for fast dpsgd implementations in JAX/TF☆59Updated 2 years ago
- The source code to reproduce the results reported in the 'Federated Online Learning to Rank with Evolution Strategies' paper, published a…☆33Updated 3 years ago
- ☆23Updated last year
- Ludwig benchmark☆20Updated 2 years ago
- Using / reproducing DAC from the paper "Disentangled Attribution Curves for Interpreting Random Forests and Boosted Trees"☆27Updated 4 years ago
- Computationally friendly hyper-parameter search with DP-SGD☆24Updated last month
- TextHide: Tackling Data Privacy in Language Understanding Tasks☆31Updated 3 years ago
- (ICML 2021) Mandoline: Model Evaluation under Distribution Shift☆31Updated 3 years ago
- Hyperparameter tuning via uncertainty modeling☆47Updated 10 months ago
- Shows how to create basic image adversaries, and train adversarially robust image classifiers (to some extent).☆13Updated 4 years ago
- Code for "Differential Privacy Has Disparate Impact on Model Accuracy" NeurIPS'19☆34Updated 3 years ago
- A collection of utilities for writing labeling functions, transformation functions, and slicing functions.☆20Updated 4 years ago
- A study of the downstream instability of word embeddings☆12Updated 2 years ago
- A simple algorithm to identify and correct for label shift.☆21Updated 7 years ago
- Concealed Data Poisoning Attacks on NLP Models☆21Updated last year
- An implementation of Wasserstein Fair Classification, a conference paper submitted to UAI 2019.☆21Updated 5 years ago
- Repository with tutorials and applications of Private-AI algorithms with PySyft☆73Updated 5 years ago
- ☆32Updated 7 years ago
- ☆39Updated 3 years ago
- Official implementation of the paper "Interventions, Where and How? Experimental Design for Causal Models at Scale", NeurIPS 2022.☆19Updated 2 years ago
- EMNLP Findings 2020: Reevaluating Adversarial Examples in Natural Language☆7Updated 4 years ago
- ☆61Updated last year
- Beta Shapley: a Unified and Noise-reduced Data Valuation Framework for Machine Learning (AISTATS 2022 Oral)☆40Updated 2 years ago
- ☆31Updated 6 years ago