ruclty / Daisy
☆19Updated 8 months ago
Alternatives and similar repositories for Daisy:
Users that are interested in Daisy are comparing it to the libraries listed below
- Implementations of differentially private release mechanisms for graph statistics☆23Updated 2 years ago
- Differentially Private Conditional Generative Adversarial Network☆30Updated 3 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆45Updated last year
- ☆29Updated 3 years ago
- A toolbox for differentially private data generation☆131Updated last year
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆47Updated last year
- Differentially-private Wasserstein GAN implementation in PyTorch☆28Updated 5 years ago
- Implementation of Adversarial Privacy Graph Embedding in TensorFlow☆19Updated 4 years ago
- An implementation of "Data Synthesis via Differentially Private Markov Random Fields"☆13Updated 11 months ago
- Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data☆33Updated 6 years ago
- Implementation of the DeepSqueeze paper: https://cs.brown.edu/people/acrotty/pubs/3318464.3389734.pdf☆12Updated 3 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆22Updated 3 years ago
- DECAF: Generating Fair Synthetic Data Using Causally-Aware Generative Networks☆20Updated 2 years ago
- Analytic calibration for differential privacy with Gaussian perturbations☆46Updated 6 years ago
- Source code of paper "Differentially Private Generative Adversarial Network"☆69Updated 6 years ago
- [NeurIPS 2021] "G-PATE: Scalable Differentially Private Data Generator via Private Aggregation of Teacher Discriminators" by Yunhui Long*…☆30Updated 3 years ago
- ☆39Updated 2 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆131Updated 2 years ago
- Code for the paper "Quantifying Privacy Leakage in Graph Embedding" published in MobiQuitous 2020☆15Updated 3 years ago
- Code for Auditing Data Provenance in Text-Generation Models (in KDD 2019)☆9Updated 5 years ago
- Code for computing tight guarantees for differential privacy☆23Updated 2 years ago
- A pytorch implementation for FACE: A Normalizing Flow based Cardinality Estimator☆21Updated last year
- 💱 A curated list of data valuation (DV) to design your next data marketplace☆117Updated last month
- Official implementation of "GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators" (NeurIPS 2020)☆69Updated 2 years ago
- tableGAN is a synthetic data generation technique (Data Synthesis based on Generative Adversarial Networks paper) based on Generative Ad…☆145Updated 5 years ago
- Official implementation of "GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models" (CCS 2020)☆47Updated 2 years ago
- ☆13Updated 2 years ago
- A simple wrapper for the PATE analysis for Differential Privacy by Papernot, Song et al.☆9Updated 4 years ago
- ☆41Updated 10 months ago