xinleihe / ContrastiveLeaks
☆10Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for ContrastiveLeaks
- Code for ML Doctor☆86Updated 3 months ago
- ☆23Updated 2 years ago
- Code related to the paper "Machine Unlearning of Features and Labels"☆68Updated 9 months ago
- ☆23Updated 2 years ago
- ☆45Updated 5 years ago
- Code for the paper: Label-Only Membership Inference Attacks☆64Updated 3 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆46Updated 2 years ago
- ☆25Updated 5 months ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆22Updated 2 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆46Updated 2 years ago
- ☆76Updated 3 years ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆67Updated 2 months ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆17Updated last month
- verifying machine unlearning by backdooring☆18Updated last year
- ☆22Updated last year
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆50Updated 2 years ago
- Anti-Backdoor learning (NeurIPS 2021)☆78Updated last year
- Camouflage poisoning via machine unlearning☆15Updated last year
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆26Updated 2 years ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆55Updated last year
- ☆6Updated 2 years ago
- ☆19Updated last year
- ☆11Updated last year
- ☆66Updated 2 years ago
- [IEEE S&P 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆18Updated last month
- Code release for DeepJudge (S&P'22)☆51Updated last year
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆17Updated last year
- ☆25Updated 5 years ago
- ☆12Updated 6 months ago
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆56Updated last month