☆51Aug 28, 2021Updated 4 years ago
Alternatives and similar repositories for Inverse_Collaborative_Inference
Users that are interested in Inverse_Collaborative_Inference are comparing it to the libraries listed below
Sorting:
- Supplementary code for the paper "UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Lear…☆14Nov 10, 2022Updated 3 years ago
- ☆25Jul 12, 2021Updated 4 years ago
- THU-AIR 联邦学习隐私与安全☆13Jun 26, 2023Updated 2 years ago
- Privacy attacks on Split Learning☆43Nov 15, 2021Updated 4 years ago
- Membership Inference of Generative Models☆15Oct 2, 2019Updated 6 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆39Jan 28, 2019Updated 7 years ago
- ☆12Sep 26, 2024Updated last year
- Code for our NeurIPS 2024 paper Improved Generation of Adversarial Examples Against Safety-aligned LLMs☆12Nov 7, 2024Updated last year
- Code for NDSS '25 paper "Passive Inference Attacks on Split Learning via Adversarial Regularization"☆13Sep 16, 2024Updated last year
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆85Jun 27, 2023Updated 2 years ago
- List of papers on cryptography assisted deep learning privacy computation☆17Dec 29, 2025Updated 2 months ago
- ☆35Oct 4, 2021Updated 4 years ago
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Oct 15, 2017Updated 8 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16May 19, 2025Updated 9 months ago
- reveal the vulnerabilities of SplitNN☆31Jun 16, 2022Updated 3 years ago
- ☆16Dec 21, 2019Updated 6 years ago
- The reproduction of the paper Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.☆63Feb 2, 2023Updated 3 years ago
- Autodidactic Neurosurgeon Collaborative Deep Inference for Mobile Edge Intelligence via Online Learning☆42Aug 14, 2021Updated 4 years ago
- Tensorflow-based framework to ease training of generative models☆19Jun 12, 2020Updated 5 years ago
- Privacy-Preserving Bandits (MLSys'20)☆22Dec 8, 2022Updated 3 years ago
- THU-AIR Vertical Federated Learning general, extensible and light-weight framework☆102Jul 18, 2024Updated last year
- Towards Reverse-Engineering Black-Box Neural Networks, ICLR'18☆56Jun 7, 2019Updated 6 years ago
- An awesome list of papers on privacy attacks against machine learning☆634Mar 18, 2024Updated last year
- Code for "Analyzing Federated Learning through an Adversarial Lens" https://arxiv.org/abs/1811.12470☆152Oct 3, 2022Updated 3 years ago
- ☆29Oct 27, 2023Updated 2 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆56May 28, 2019Updated 6 years ago
- TextHide: Tackling Data Privacy in Language Understanding Tasks☆31Apr 19, 2021Updated 4 years ago
- Starter repository for submissions to the CausalBench challenge for gene-gene graph inference from genetic perturbation experiments.☆32May 17, 2023Updated 2 years ago
- ☆28Mar 15, 2023Updated 2 years ago
- Based on Neural Amp Modeler 0.7.1 with some enhanced features☆12Apr 18, 2023Updated 2 years ago
- Systematic Evaluation of Membership Inference Privacy Risks of Machine Learning Models☆133Apr 9, 2024Updated last year
- This is a PyTorch implementation of the paper "Reinforcement Learning-Based Black-Box Model Inversion Attacks" accepted by CVPR 2023.☆40May 4, 2023Updated 2 years ago
- Reference implementation of the PRADA model stealing defense. IEEE Euro S&P 2019.☆35Mar 20, 2019Updated 6 years ago
- Code for improving the performance of sequence-to-expression models for making individual-specific gene expression predictions by fine-tu…☆15Dec 12, 2025Updated 2 months ago
- ☆13Aug 14, 2023Updated 2 years ago
- Calculations of dipole axis, dipole poles, and dipole tilt angle☆10Oct 28, 2024Updated last year
- AGS Fast Wave Function Collapse Plugin☆15Jun 23, 2020Updated 5 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- Simulating the quantum approximate optimization algorithm with Matlab☆12Aug 26, 2021Updated 4 years ago