☆37Dec 23, 2025Updated 2 months ago
Alternatives and similar repositories for rofl-project-code
Users that are interested in rofl-project-code are comparing it to the libraries listed below
Sorting:
- ☆28Mar 24, 2023Updated 2 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Sep 27, 2022Updated 3 years ago
- ☆47Aug 3, 2020Updated 5 years ago
- ☆17May 10, 2019Updated 6 years ago
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (ICML 2021)☆74Aug 5, 2021Updated 4 years ago
- ☆47Oct 19, 2021Updated 4 years ago
- Exam summary for Computational Intelligence Lab, ETH Zurich, SS16☆11Jul 6, 2017Updated 8 years ago
- ☆19Feb 3, 2026Updated last month
- Model LEGO: Creating Models Like Disassembling and Assembling Building Blocks☆17Jan 15, 2025Updated last year
- Self-Teaching Notes on Gradient Leakage Attacks against GPT-2 models.☆14Mar 18, 2024Updated 2 years ago
- ☆13Sep 12, 2021Updated 4 years ago
- Code for USENIX Security 2023 Paper "Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks"☆21May 19, 2024Updated last year
- Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization☆13Jun 21, 2021Updated 4 years ago
- NN-EMD framework: efficiently training neural networks using encrypted multi-sourced datasets☆14Jun 6, 2021Updated 4 years ago
- Source code for paper "How to Backdoor Federated Learning" (https://arxiv.org/abs/1807.00459)☆315Jul 25, 2024Updated last year
- Official repository of the paper "Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning".☆12Mar 28, 2022Updated 3 years ago
- This repository contains prototype software implementation of Threshold FHE, i.e., Fully Homomorphic Encryption with threshold decryption…☆10Dec 1, 2022Updated 3 years ago
- A secure aggregation system for private federated learning☆51May 13, 2024Updated last year
- A simple Python implementation of a secure aggregation protocole for federated learning.☆37May 1, 2023Updated 2 years ago
- Python impl of VRF's.☆19Mar 12, 2023Updated 3 years ago
- Source code for MLSys 2022 submission "LightSecAgg: a Lightweight and Versatile Design for Secure Aggregation in Federated Learning"☆29Oct 25, 2021Updated 4 years ago
- Droplet: Decentralized Authorization for IoT Data Streams☆15May 22, 2023Updated 2 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆83Mar 24, 2023Updated 2 years ago
- Secure aggregation protocol for TensorFlow Federated☆24Aug 19, 2020Updated 5 years ago
- Data Banzhaf: A Robust Data Valuation Framework for Machine Learning (AISTATS 2023 Oral)☆18Oct 15, 2023Updated 2 years ago
- A Simulator for Privacy Preserving Federated Learning☆95Jan 12, 2021Updated 5 years ago
- Source code for the VLDB 2021 paper.☆11May 19, 2021Updated 4 years ago
- Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets☆41Feb 25, 2023Updated 3 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Feb 25, 2021Updated 5 years ago
- [ACM EuroSys'24] Dordis: Efficient Federated Learning with Dropout-Resilient Differential Privacy☆24Apr 28, 2025Updated 10 months ago
- Python3 implementation of Bulletproofs - non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup…☆28Dec 8, 2022Updated 3 years ago
- Learning how to bulletproofs☆38Dec 22, 2018Updated 7 years ago
- MCSI☆13Nov 2, 2021Updated 4 years ago
- This is the code for our paper `Robust Federated Learning with Attack-Adaptive Aggregation' accepted by FTL-IJCAI'21.☆46Jun 12, 2023Updated 2 years ago
- Code for "Analyzing Federated Learning through an Adversarial Lens" https://arxiv.org/abs/1811.12470☆153Oct 3, 2022Updated 3 years ago
- A pytorch implementation of the paper "Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage".☆62Oct 24, 2022Updated 3 years ago
- FedAvg code with privacy protection function, the application of Paillier homomorphic encryption algorithm and differential privacy, diff…☆132Sep 30, 2024Updated last year
- List Flower resources☆12Feb 4, 2022Updated 4 years ago