☆52Aug 28, 2021Updated 4 years ago
Alternatives and similar repositories for Inverse_Collaborative_Inference
Users that are interested in Inverse_Collaborative_Inference are comparing it to the libraries listed below
Sorting:
- Supplementary code for the paper "UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Lear…☆14Nov 10, 2022Updated 3 years ago
- ☆25Jul 12, 2021Updated 4 years ago
- Privacy attacks on Split Learning☆43Nov 15, 2021Updated 4 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆39Jan 28, 2019Updated 7 years ago
- THU-AIR 联邦学习隐私与安全☆13Jun 26, 2023Updated 2 years ago
- List of papers on cryptography assisted deep learning privacy computation☆17Dec 29, 2025Updated 2 months ago
- Code Repo for paper Label Leakage and Protection in Two-party Split Learning (ICLR 2022).☆22Mar 12, 2022Updated 4 years ago
- ☆12Sep 26, 2024Updated last year
- Membership Inference of Generative Models☆15Oct 2, 2019Updated 6 years ago
- The implementation of paper : RTCoInfer: Real-time Edge-Cloud Collaborative CNN Inference for Stream Analytics on Ubiquitous Images☆17Oct 18, 2022Updated 3 years ago
- Code for paper "Locally Distributed Deep Learning Inference on Edge Device Clusters"☆15Aug 22, 2025Updated 7 months ago
- ☆35Oct 4, 2021Updated 4 years ago
- The reproduction of the paper Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.☆63Feb 2, 2023Updated 3 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆86Jun 27, 2023Updated 2 years ago
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Oct 15, 2017Updated 8 years ago
- Autodidactic Neurosurgeon Collaborative Deep Inference for Mobile Edge Intelligence via Online Learning☆42Aug 14, 2021Updated 4 years ago
- Towards Reverse-Engineering Black-Box Neural Networks, ICLR'18☆56Jun 7, 2019Updated 6 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆84Feb 26, 2023Updated 3 years ago
- anonymous github for SGSR: Beyond Social Homophily: Score-based Generative Diffusion Models for Social Recommendations☆12Sep 18, 2025Updated 6 months ago
- An awesome list of papers on privacy attacks against machine learning☆634Mar 18, 2024Updated 2 years ago
- Research into model inversion on SplitNN☆18Feb 20, 2024Updated 2 years ago
- Collaborative inference of latent diffusion via hivemind☆12May 29, 2023Updated 2 years ago
- Code for "Analyzing Federated Learning through an Adversarial Lens" https://arxiv.org/abs/1811.12470☆153Oct 3, 2022Updated 3 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆56May 28, 2019Updated 6 years ago
- THU-AIR Vertical Federated Learning general, extensible and light-weight framework☆103Jul 18, 2024Updated last year
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Jul 18, 2023Updated 2 years ago
- R-GAP: Recursive Gradient Attack on Privacy [Accepted at ICLR 2021]☆37Feb 20, 2023Updated 3 years ago
- ☆28Mar 15, 2023Updated 3 years ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆46Jul 18, 2025Updated 8 months ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆85Nov 22, 2021Updated 4 years ago
- Code for Findings-ACL 2023 paper: Sentence Embedding Leaks More Information than You Expect: Generative Embedding Inversion Attack to Rec…☆48Jun 3, 2024Updated last year
- Code for "Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders" at ICML 2024☆10Sep 18, 2025Updated 6 months ago
- ☆16Dec 21, 2019Updated 6 years ago
- [ICCV 2025] Official implementation of "AD-GS: Object-Aware B-Spline Gaussian Splatting for Self-Supervised Autonomous Driving"☆37Jul 15, 2025Updated 8 months ago
- ☆10Jun 5, 2021Updated 4 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- Pytorch Dataloader - GTSRB (German Traffic Sign Recognition)☆20Apr 16, 2019Updated 6 years ago
- ☆13Jan 14, 2020Updated 6 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆22Mar 1, 2019Updated 7 years ago