serval-uni-lu / tabularbench
TabularBench: Adversarial robustness benchmark for tabular data
☆17Updated 4 months ago
Alternatives and similar repositories for tabularbench
Users that are interested in tabularbench are comparing it to the libraries listed below
Sorting:
- Code for ML Doctor☆87Updated 9 months ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 2 years ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆26Updated 9 months ago
- [ICML 2024 Spotlight] Differentially Private Synthetic Data via Foundation Model APIs 2: Text☆39Updated 4 months ago
- ☆13Updated 2 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- ☆25Updated 2 years ago
- Private Evolution: Generating DP Synthetic Data without Training [ICLR 2024, ICML 2024 Spotlight]☆95Updated this week
- ☆21Updated 3 months ago
- ☆66Updated 4 years ago
- Computationally friendly hyper-parameter search with DP-SGD☆25Updated 4 months ago
- ☆34Updated last year
- [ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning☆30Updated last year
- Code relative to "Adversarial robustness against multiple and single $l_p$-threat models via quick fine-tuning of robust classifiers"☆18Updated 2 years ago
- ☆65Updated last year
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆18Updated 2 months ago
- ☆44Updated 2 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆49Updated 2 years ago
- ☆31Updated 8 months ago
- ☆19Updated 2 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆47Updated 2 years ago
- ☆11Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated last week
- ☆46Updated 4 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 3 years ago
- ☆29Updated 11 months ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆69Updated last year
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆30Updated 3 years ago
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"☆45Updated last month
- ☆22Updated 2 years ago