shrebox / Privacy-Attacks-in-Machine-LearningLinks
Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.
☆62Updated 8 months ago
Alternatives and similar repositories for Privacy-Attacks-in-Machine-Learning
Users that are interested in Privacy-Attacks-in-Machine-Learning are comparing it to the libraries listed below
Sorting:
- This repo implements several algorithms for learning with differential privacy.☆108Updated 2 years ago
- ☆70Updated 3 years ago
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆60Updated 6 years ago
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆56Updated 6 months ago
- ☆38Updated 4 years ago
- ☆37Updated 3 years ago
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (ICML 2021)☆72Updated 3 years ago
- The official code of KDD22 paper "FLDetecotor: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clien…☆84Updated 2 years ago
- ☆55Updated 2 years ago
- ☆30Updated last year
- The implementatioin code of paper: “A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning”☆11Updated last year
- ☆14Updated last year
- The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".☆34Updated 2 years ago
- ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341☆73Updated 2 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆56Updated 2 years ago
- Official implementation of "FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective"…☆42Updated 3 years ago
- Code to reproduce experiments in "Antipodes of Label Differential Privacy PATE and ALIBI"☆32Updated 3 years ago
- The code of the attack scheme in the paper "Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning"☆19Updated last year
- Privacy attacks on Split Learning☆42Updated 3 years ago
- ☆26Updated last year
- The code for "Improved Deep Leakage from Gradients" (iDLG).☆152Updated 4 years ago
- [ICML 2023] Official code implementation of "Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning (htt…☆41Updated 5 months ago
- Multi-metrics adaptively identifies backdoors in Federated learning☆27Updated this week
- Code to accompany the paper "Deep Learning with Gaussian Differential Privacy"☆33Updated 4 years ago
- 基于《A Little Is Enough: Circumventing Defenses For Distributed Learning》的联邦学习攻击模型☆63Updated 5 years ago
- ☆52Updated last year
- ☆25Updated 3 years ago
- ☆23Updated last year
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Updated 5 years ago
- Differentially Private Federated Learning on Heterogeneous Data☆65Updated 3 years ago