UA-FedRec
News recommender attack vulnerability
An implementation of a federated news recommendation system vulnerable to untargeted attacks
The python implementation of our "UA-FedRec: Untargeted Attack on Federated News Recommendation" in KDD 2023.
19 stars
1 watching
2 forks
Language: Jupyter Notebook
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A PyTorch implementation of an attack and defense mechanism against Federated Recommendation Systems | 21 |
| A defense mechanism against model poisoning attacks in federated learning | 37 |
| An implementation of an adversarial attack method in federated learning | 11 |
| A tool for demonstrating and analyzing attacks on federated learning systems by introducing backdoors into distributed machine learning models. | 179 |
| A PyTorch implementation of an attack-tolerant federated learning system to train robust local models against malicious attacks from adversaries. | 10 |
| Researchers investigate vulnerabilities in Federated Learning systems by introducing new backdoor attacks and exploring methods to defend against them. | 66 |
| A backdoor defense system for federated learning, designed to protect against data poisoning attacks by isolating subspace training and aggregating models with robust consensus fusion. | 18 |
| An implementation of Federated Robustness Propagation in PyTorch to share robustness across heterogeneous federated learning users. | 26 |
| A framework for attacking federated learning systems with adaptive backdoor attacks | 23 |
| An implementation of a game-theoretic defense against backdoor attacks in federated learning. | 6 |
| An implementation of a defense against model inversion attacks in federated learning | 55 |
| An algorithm to improve convergence rates and protect privacy in Federated Learning by addressing the catastrophic forgetting issue during local training | 26 |
| Develops and evaluates a framework for detecting attacks on federated learning systems | 11 |
| A collection of Yara rules for detecting malware evasion techniques and malicious activity. | 25 |
| This project presents an attack on federated learning systems to compromise their privacy-preserving mechanisms. | 8 |