ssg-research / WAFFLELinks
WAFFLE: Watermarking in Federated Learning
☆21Updated last year
Alternatives and similar repositories for WAFFLE
Users that are interested in WAFFLE are comparing it to the libraries listed below
Sorting:
- Webank AI☆41Updated 3 months ago
- ICML 2022 code for "Neurotoxin: Durable Backdoors in Federated Learning" https://arxiv.org/abs/2206.10341☆73Updated 2 years ago
- ☆69Updated 2 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆53Updated 6 years ago
- [ICLR 2023, Best Paper Award at ECCV’22 AROW Workshop] FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning☆56Updated 5 months ago
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (ICML 2021)☆72Updated 3 years ago
- ☆30Updated 5 years ago
- ☆45Updated 5 years ago
- ☆47Updated 4 years ago
- Code for ML Doctor☆88Updated 9 months ago
- The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".☆34Updated 2 years ago
- ☆55Updated 2 years ago
- The code of the attack scheme in the paper "Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning"☆19Updated last year
- ☆21Updated 3 years ago
- [CCS 2021] "DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation" by Boxin Wang*, Fan Wu*, Yunhui Long…☆38Updated 3 years ago
- Privacy attacks on Split Learning☆42Updated 3 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆48Updated 3 years ago
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆37Updated 2 years ago
- ☆25Updated 3 years ago
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆56Updated 2 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 3 years ago
- ☆14Updated 11 months ago
- Code for the paper: Label-Only Membership Inference Attacks☆65Updated 3 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- ☆27Updated last year
- Code to reproduce experiments in "Antipodes of Label Differential Privacy PATE and ALIBI"☆32Updated 3 years ago
- Backdoor detection in Federated learning with similarity measurement☆23Updated 3 years ago
- The core code for our paper "Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning".☆21Updated last year
- ☆25Updated 2 years ago
- The implementatioin code of paper: “A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning”☆11Updated last year