☆10Dec 30, 2021Updated 4 years ago
Alternatives and similar repositories for ContrastiveLeaks
Users that are interested in ContrastiveLeaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Apr 11, 2021Updated 4 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- ☆31Feb 10, 2022Updated 4 years ago
- ☆44Apr 25, 2023Updated 2 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆18Jul 12, 2022Updated 3 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- ☆15Feb 21, 2024Updated 2 years ago
- Code for ML Doctor☆91Aug 14, 2024Updated last year
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆21Oct 8, 2024Updated last year
- ☆27Nov 20, 2023Updated 2 years ago
- ☆22Feb 25, 2019Updated 7 years ago
- FLPoison: Benchmarking Poisoning Attacks and Defenses in Federated Learning☆56Sep 22, 2025Updated 6 months ago
- Autosplitter program for Celeste on Linux☆14Oct 6, 2023Updated 2 years ago
- Official repo of the paper Can Bad Teaching Induce Forgetting? Unlearning in Deep Networks using an Incompetent Teacher accepted in AAAI …☆40Oct 11, 2023Updated 2 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Sep 7, 2021Updated 4 years ago
- Modular Adversarial Robustness Toolkit☆21Jul 11, 2025Updated 8 months ago
- ☆12Sep 26, 2024Updated last year
- ☆53Aug 17, 2024Updated last year
- An unofficial pyotrch implementation of "ML-Leaks:Model and Data Independent Membership Inference Attacks and Defenses on ML Models"☆11Dec 23, 2023Updated 2 years ago
- ☆14May 8, 2024Updated last year
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- Bias Mimicking: A simple sampling approach for Bias Mitigation (CVPR 23)☆14Aug 6, 2023Updated 2 years ago
- Code and data for the ACM CIKM 2022 paper "Rank List Sensitivity of Recommender Systems to Interaction Perturbations"☆10Aug 16, 2022Updated 3 years ago
- ☆21Sep 21, 2021Updated 4 years ago
- Make a macro-pad using a Raspberry pi pico and circuit python☆20Apr 25, 2022Updated 3 years ago
- A Maximal Mutual Information Criterion for Manipulation Concept Discovery☆13Sep 26, 2024Updated last year
- This repository contains the official implementation of CoMix (NeurIPS 2021) https://arxiv.org/pdf/2110.15128.pdf.☆22Jan 12, 2022Updated 4 years ago
- Code for the paper "Quantifying Privacy Leakage in Graph Embedding" published in MobiQuitous 2020☆18Nov 11, 2021Updated 4 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- A tensorflow implementation of paper "A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer"☆15Dec 24, 2018Updated 7 years ago
- Local Discriminative Regions for Scene Recognition (ACMMM 2018)☆22Oct 3, 2023Updated 2 years ago
- GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation (USENIX Security '23)☆49Jul 3, 2023Updated 2 years ago
- Multi process and multi GPU snake training. Using A2C with a CNN.☆12Apr 8, 2023Updated 2 years ago
- Unsupervised Graph Poisoning Attack via Contrastive Loss Back-propagation, WWW22☆17Jun 30, 2022Updated 3 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- ☆26Mar 31, 2021Updated 4 years ago
- ☆60Jun 17, 2020Updated 5 years ago
- POI微信小程序☆12Sep 12, 2018Updated 7 years ago
- [NDSS'25] The official implementation of safety misalignment.☆17Jan 8, 2025Updated last year