pengyuan-zhou / Privacy-Preserving-Computation-PaperListLinks
Paper list and relevant material for Privacy-Preserving Computation.
☆9Updated 2 years ago
Alternatives and similar repositories for Privacy-Preserving-Computation-PaperList
Users that are interested in Privacy-Preserving-Computation-PaperList are comparing it to the libraries listed below
Sorting:
- ☆52Updated 2 years ago
- ☆14Updated last year
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆83Updated 2 years ago
- ☆39Updated last year
- Paper notes and code for differentially private machine learning☆356Updated 7 months ago
- ☆25Updated 4 years ago
- ☆31Updated last year
- The implementatioin code of paper: “A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning”☆11Updated 2 years ago
- ☆35Updated 3 years ago
- FedAvg code with privacy protection function, the application of Paillier homomorphic encryption algorithm and differential privacy, diff…☆123Updated 9 months ago
- ☆23Updated last year
- IBA: Towards Irreversible Backdoor Attacks in Federated Learning (Poster at NeurIPS 2023)☆36Updated last year
- DPSUR☆26Updated 5 months ago
- The official code of KDD22 paper "FLDetecotor: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clien…☆84Updated 2 years ago
- The Algorithmic Foundations of Differential Pivacy by Cynthia Dwork Chinese Translation☆165Updated 2 years ago
- Code for NDSS 2021 Paper "Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses Against Federated Learning"☆147Updated 2 years ago
- ☆26Updated last year
- ☆16Updated last year
- DBA: Distributed Backdoor Attacks against Federated Learning (ICLR 2020)☆196Updated 3 years ago
- A foundational platform that primarily shares federated learning, differential privacy content☆22Updated 4 months ago
- ☆38Updated 4 years ago
- ⚔️ Blades: A Unified Benchmark Suite for Attacks and Defenses in Federated Learning☆143Updated 5 months ago
- reproduce the FLTrust model based on the paper "FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping"☆30Updated 2 years ago
- 使用tensorflow2.1实现联合学习推荐模型,并加入差分隐私噪声进行隐私保护。☆54Updated 2 years ago
- paper code☆26Updated 4 years ago
- The code of the attack scheme in the paper "Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning"☆19Updated last year
- 基于《A Little Is Enough: Circumventing Defenses For Distributed Learning》的联邦学习攻击模型☆63Updated 5 years ago
- Code for Data Poisoning Attacks Against Federated Learning Systems☆196Updated 4 years ago
- An implementation of Secure Aggregation algorithm based on "Practical Secure Aggregation for Privacy-Preserving Machine Learning (Bonawit…☆88Updated 5 years ago
- Official Implementation of "Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning"☆10Updated 5 months ago