zhangzp9970 / MIA
Unofficial pytorch implementation of paper: Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
☆25Updated last year
Related projects ⓘ
Alternatives and complementary repositories for MIA
- Official implementation of "Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective"☆55Updated last year
- The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".☆30Updated 2 years ago
- Implementation of the paper : "Membership Inference Attacks Against Machine Learning Models", Shokri et al.☆50Updated 5 years ago
- ☆39Updated 3 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆45Updated 2 years ago
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆57Updated last month
- [CCS 2021] "DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation" by Boxin Wang*, Fan Wu*, Yunhui Long…☆37Updated 2 years ago
- Code for ML Doctor☆86Updated 2 months ago
- ☆21Updated 3 years ago
- Privacy attacks on Split Learning☆37Updated 2 years ago
- ☆45Updated 5 years ago
- Official Repository for ResSFL (accepted by CVPR '22)☆20Updated 2 years ago
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (ICML 2021)☆70Updated 3 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆30Updated 4 years ago
- ☆64Updated 2 years ago
- [ICML 2022 / ICLR 2024] Source code for our papers "Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks" and "Be C…☆37Updated 3 months ago
- This repo implements several algorithms for learning with differential privacy.☆101Updated last year
- Code for the paper: Label-Only Membership Inference Attacks☆64Updated 3 years ago
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Updated 2 years ago
- ☆23Updated 3 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆53Updated 5 years ago
- R-GAP: Recursive Gradient Attack on Privacy [Accepted at ICLR 2021]☆34Updated last year
- ☆25Updated 5 years ago
- Code to reproduce experiments in "Antipodes of Label Differential Privacy PATE and ALIBI"☆30Updated 2 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆38Updated 5 years ago
- Learning from history for Byzantine Robustness☆21Updated 3 years ago
- ☆32Updated 2 months ago
- ☆19Updated last year
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆13Updated 3 years ago
- [CVPR-2023] Re-thinking Model Inversion Attacks Against Deep Neural Networks☆36Updated 11 months ago