kohpangwei / data-poisoning-journal-release

17 stars 4 forks source link

Stronger Data Poisoning Attacks Break Data Sanitization Defenses

This code replicates the experiments from the following paper:

Pang Wei Koh, Jacob Steinhardt, and Percy Liang

Stronger Data Poisoning Attacks Break Data Sanitization Defenses

Dependencies

We use the following dependencies:

Data and setup

For historical reasons, this codebase is split into Python and MATLAB components:

You can download the datasets we used here. For convenience, we have included .npz and .mat versions of the datasets for use in the Python and MATLAB files.

To set up the directory structure, you might want to edit the following files:

Influence attack

Decoy parameter generation (for KKT and min-max attacks)

KKT attack

Min-max attack

Other files:

Evaluating attacks against defenses