spring-epfl / CS-523-public
β13Updated 5 months ago
Related projects β
Alternatives and complementary repositories for CS-523-public
- π¦βΏπ¦βΏπ¦ Intuitive and insightful blockchain explorer πβ19Updated last year
- β79Updated 2 years ago
- Template for EPFL (BSc, MSc, or doctoral) theses and semester projectsβ126Updated last year
- Code for Auditing Data Provenance in Text-Generation Models (in KDD 2019)β9Updated 5 years ago
- Code related to βBeyond spectral gap: The role of the topology in decentralized learningβ.β11Updated 2 years ago
- code for model-targeted poisoningβ12Updated last year
- β15Updated last year
- β13Updated 3 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"β85Updated 3 years ago
- β32Updated 2 months ago
- β24Updated 2 years ago
- β19Updated last year
- Code for identifying natural backdoors in existing image datasets.β15Updated 2 years ago
- Public implementation of ICML'19 paper "White-box vs Black-box: Bayes Optimal Strategies for Membership Inference"β12Updated 4 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learningβ31Updated 2 years ago
- β21Updated last year
- verifying machine unlearning by backdooringβ18Updated last year
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on β¦β99Updated 2 years ago
- β11Updated 2 years ago
- Convex Layerwise Adversarial Training (COLT)β29Updated 3 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)β53Updated 5 years ago
- Code for Auditing DPSGDβ35Updated 2 years ago
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021β20Updated 2 years ago
- Code for FAB-attackβ32Updated 4 years ago
- β11Updated last year
- Algorithms for Privacy-Preserving Machine Learning in JAXβ89Updated 5 months ago
- This is a python script to generate nice bibtex file for latex.β16Updated 4 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".β12Updated last year
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020β10Updated 4 years ago
- β16Updated 2 years ago