trusthlt / dp-bart-private-rewriting
DP-BART for Privatized Text Rewriting under Local Differential Privacy
☆16Updated 3 months ago
Alternatives and similar repositories for dp-bart-private-rewriting:
Users that are interested in dp-bart-private-rewriting are comparing it to the libraries listed below
- ☆71Updated 2 years ago
- DP-Rewrite: Towards Reproducibility and Transparency in Differentially Private Text Rewriting☆14Updated last year
- ☆18Updated 3 years ago
- Official repo for the paper: Recovering Private Text in Federated Learning of Language Models (in NeurIPS 2022)☆57Updated last year
- This repo implements several algorithms for learning with differential privacy.☆104Updated 2 years ago
- LAMP: Extracting Text from Gradients with Language Model Priors (NeurIPS '22)☆24Updated 2 years ago
- [ICLR'24 Spotlight] DP-OPT: Make Large Language Model Your Privacy-Preserving Prompt Engineer☆36Updated 8 months ago
- [CCS 2021] "DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation" by Boxin Wang*, Fan Wu*, Yunhui Long…☆37Updated 3 years ago
- A survey of privacy problems in Large Language Models (LLMs). Contains summary of the corresponding paper along with relevant code☆66Updated 8 months ago
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆36Updated 7 months ago
- ☆12Updated 2 years ago
- ☆23Updated last year
- A codebase that makes differentially private training of transformers easy.☆170Updated 2 years ago
- Code for Auditing Data Provenance in Text-Generation Models (in KDD 2019)☆9Updated 5 years ago
- Differentially-private transformers using HuggingFace and Opacus☆132Updated 5 months ago
- 🔒 Implementation of Shokri et al(2016) "Membership Inference Attacks against Machine Learning Models"☆34Updated 2 years ago
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆41Updated 2 years ago
- ☆21Updated 10 months ago
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆39Updated 3 years ago
- Robust natural language watermarking using invariant features☆26Updated last year
- Repository for Towards Codable Watermarking for Large Language Models☆35Updated last year
- ☆58Updated last month
- Pytorch implementations of Client-Customized Adaptation for Parameter-Efficient Federated Learning (Findings of ACL: ACL 2023)☆16Updated last year
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆29Updated 2 years ago
- ☆17Updated 2 years ago
- ☆11Updated 2 years ago
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆58Updated 5 years ago
- The code for paper "The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG)", exploring the privacy risk o…☆39Updated 3 weeks ago
- ☆27Updated 2 years ago