Code for hands-on experience with reconstruction attacks in a simple setting with a server that answers linear queries on hidden, pseudorandom datasets in {-1,+1}^n. To start using it, upload linear_query_server.py as a web app on a suitable server, for example using pythonanywhere.com. Once the server is up the reconstruction attack code can use it to answer linear queries on datasets, identified with a "challenge ID" string. A baseline implementation is included as a template. The server keeps track of queries and provides a leaderboard of submissions on n-dimensional datasets using at most 2n queries. Everything is meant to be used in a small-scale setting, like teaching a class on differential privacy, and will not scale to large sets of users.
-
Notifications
You must be signed in to change notification settings - Fork 2
Code for hands-on experience with reconstruction attacks in a simple setting
License
rasmus-pagh/reconstruction-attacks
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Code for hands-on experience with reconstruction attacks in a simple setting
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published