-
I am trying to get TF-privacy optimizers to work with an LSTM RNN model. When I select a Keras differentially private optimizer, training fails in compute_gradients() is called.
Any guidance on ho…
-
The documentation of the Wishart mechanism references the paper "Symmetric matrix perturbation for differentially-private principal component analysis" by Imtiaz and Sarwate.
Yet, two subsequent pa…
-
-
### Brief Summary:
Describe the what, why, and how of your content idea in 2-5 sentences.
Continuation of Issue #407
Federated learning (also known as collaborative learning) is a machine learnin…
-
## Description
We now support secure aggregation , let's update this tutorial!
## How to?
[EDIT: the link to the tutorial was wrong, it's now corrected]
Tutorial https://blog.openmined.org/pysyf…
-
Logged in users can use Two Ravens to explore differentially private versions of the metadata for sensitive files.
-
Type In differential-privacy/cc/testing/README.md
Not bazel test testing:stochastic_test_test.cc
True **bazel test testing:stochastic_tester_test.cc**
:shipit:
-
Hello Team Opacus , I would like to understand if there are any examples anywhere which demonstrates how training with DP could mitigate model Inversion attacks , membership inference and other privac…
-
Currently we assume that tokens are opaque to the client, meaning that the client doesn't care about their internals (although in practice JWT is often used). It's even described as such in our curren…
-
I'm basically writing a decent ARI interface for an asterisk project of mine and for some reason i cannot see at this point i keep getting this:
**name not present, Error: The JSON document has an …