mmalekzadeh / privacy-preserving-bandits
Privacy-Preserving Bandits (MLSys'20)
☆22Updated last year
Related projects: ⓘ
- ☆17Updated 4 years ago
- The code reproduces the results of the experiments in the paper. In particular, it performs experiments in which machine-learning models …☆19Updated 3 years ago
- The source code to reproduce the results reported in the 'Federated Online Learning to Rank with Evolution Strategies' paper, published a…☆32Updated 3 years ago
- A concise primer on Differential Privacy☆28Updated 4 years ago
- Code for fast dpsgd implementations in JAX/TF☆58Updated last year
- ☆15Updated 4 years ago
- 📰 Computing the information content of trained neural networks☆16Updated 2 years ago
- ☆23Updated 8 months ago
- Code for "Differential Privacy Has Disparate Impact on Model Accuracy" NeurIPS'19☆34Updated 3 years ago
- Model Patching: Closing the Subgroup Performance Gap with Data Augmentation☆42Updated 3 years ago
- Code to study the generalisability of benchmark models on non-stationary EHRs.☆14Updated 5 years ago
- Using / reproducing DAC from the paper "Disentangled Attribution Curves for Interpreting Random Forests and Boosted Trees"☆25Updated 3 years ago
- Concealed Data Poisoning Attacks on NLP Models☆19Updated last year
- (ICML 2021) Mandoline: Model Evaluation under Distribution Shift☆30Updated 3 years ago
- The Concept Bottleneck Shift Detection (CBSD) methods for explaining and detecting various dataset shifts.☆14Updated 3 years ago
- SAP Security research sample code and tutorials for generating differentially private synthetic datasets using generative deep learning m…☆23Updated 6 months ago
- Beta Shapley: a Unified and Noise-reduced Data Valuation Framework for Machine Learning (AISTATS 2022 Oral)☆38Updated last year
- Automatic and Simultaneous Adjustment of Learning Rate and Momentum for Stochastic Gradient Descent☆44Updated 4 years ago
- TextHide: Tackling Data Privacy in Language Understanding Tasks☆30Updated 3 years ago
- Blind Justice Code for the paper "Blind Justice: Fairness with Encrypted Sensitive Attributes", ICML 2018☆14Updated 5 years ago
- A simple algorithm to identify and correct for label shift.☆22Updated 6 years ago
- Shows how to create basic image adversaries, and train adversarially robust image classifiers (to some extent).☆13Updated 3 years ago
- Implements EvoNorms B0 and S0 as proposed in Evolving Normalization-Activation Layers.☆11Updated 4 years ago
- ☆35Updated 2 years ago
- Hyperparameter tuning via uncertainty modeling☆46Updated 4 months ago
- ☆61Updated last year
- Differentially private release of semantic rich data☆35Updated 3 years ago
- Code for Quantifying Ignorance in Individual-Level Causal-Effect Estimates under Hidden Confounding☆21Updated last year
- ☆32Updated 11 months ago
- An implementation of Wasserstein Fair Classification, a conference paper submitted to UAI 2019.☆21Updated 4 years ago