☆37Dec 23, 2025Updated 2 months ago
Alternatives and similar repositories for rofl-project-code
Users that are interested in rofl-project-code are comparing it to the libraries listed below
Sorting:
- ☆28Mar 24, 2023Updated 2 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆28Dec 6, 2022Updated 3 years ago
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (ICML 2021)☆74Aug 5, 2021Updated 4 years ago
- Self-Teaching Notes on Gradient Leakage Attacks against GPT-2 models.☆14Mar 18, 2024Updated last year
- ☆13Sep 12, 2021Updated 4 years ago
- ☆47Oct 19, 2021Updated 4 years ago
- ☆47Aug 3, 2020Updated 5 years ago
- Source code for MLSys 2022 submission "LightSecAgg: a Lightweight and Versatile Design for Secure Aggregation in Federated Learning"☆28Oct 25, 2021Updated 4 years ago
- Code release for MPCViT accepted by ICCV 2023☆16Jan 6, 2025Updated last year
- NN-EMD framework: efficiently training neural networks using encrypted multi-sourced datasets☆14Jun 6, 2021Updated 4 years ago
- Model LEGO: Creating Models Like Disassembling and Assembling Building Blocks☆17Jan 15, 2025Updated last year
- Official repository of the paper "Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning".☆12Mar 28, 2022Updated 3 years ago
- A simple Python implementation of a secure aggregation protocole for federated learning.☆37May 1, 2023Updated 2 years ago
- ☆16May 10, 2019Updated 6 years ago
- A secure aggregation system for private federated learning☆49May 13, 2024Updated last year
- A Simulator for Privacy Preserving Federated Learning☆95Jan 12, 2021Updated 5 years ago
- Data Banzhaf: A Robust Data Valuation Framework for Machine Learning (AISTATS 2023 Oral)☆18Oct 15, 2023Updated 2 years ago
- [USENIX Security'24] Lotto: Secure Participant Selection against Adversarial Servers in Federated Learning☆21Apr 28, 2025Updated 10 months ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Dec 8, 2022Updated 3 years ago
- ☆20Feb 3, 2026Updated 3 weeks ago
- Python impl of VRF's.☆19Mar 12, 2023Updated 2 years ago
- Code for USENIX Security 2023 Paper "Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks"☆21May 19, 2024Updated last year
- Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets☆41Feb 25, 2023Updated 3 years ago
- ☆22Jun 11, 2021Updated 4 years ago
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆17May 5, 2020Updated 5 years ago
- This is the code for our paper `Robust Federated Learning with Attack-Adaptive Aggregation' accepted by FTL-IJCAI'21.☆46Jun 12, 2023Updated 2 years ago
- [arXiv'21] Additively Symmetric Homomorphic Encryption for Cross-Silo Federated Learning☆22Apr 28, 2025Updated 10 months ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆24Mar 13, 2022Updated 3 years ago
- ☆55Feb 19, 2023Updated 3 years ago
- This repository contains the official implementation for the manuscript: Make Landscape Flatter in Differentially Private Federated Lear…☆56Oct 12, 2025Updated 4 months ago
- Implementation of calibration bounds for differential privacy in the shuffle model☆21Nov 10, 2020Updated 5 years ago
- Code for "Analyzing Federated Learning through an Adversarial Lens" https://arxiv.org/abs/1811.12470☆152Oct 3, 2022Updated 3 years ago
- A pytorch implementation of the paper "Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage".☆62Oct 24, 2022Updated 3 years ago
- Privacy Budget Orchestration in Machine Learning Workloads (OSDI '21)☆26Oct 20, 2023Updated 2 years ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Feb 25, 2021Updated 5 years ago
- IEEE TIFS'20: VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning☆26Aug 22, 2022Updated 3 years ago
- FedAvg code with privacy protection function, the application of Paillier homomorphic encryption algorithm and differential privacy, diff…☆133Sep 30, 2024Updated last year
- reproduce the FLTrust model based on the paper "FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping"☆33Dec 4, 2022Updated 3 years ago
- ☆54Jun 22, 2021Updated 4 years ago