Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -647,5 +647,7 @@
"For real-world applications, replace the synthetic data with actual attack results from your membership inference attacks. Consider experimenting with different values of delta and p_value to understand their impact on the analysis."
]
}
]
],
"nbformat": 4,
"nbformat_minor": 5
}
4 changes: 3 additions & 1 deletion tutorial_notebooks/lira_attack_cifar10_tutorial.ipynb
Original file line number Diff line number Diff line change
Expand Up @@ -682,5 +682,7 @@
"By understanding and addressing these privacy risks, you can build more privacy-preserving machine learning models."
]
}
]
],
"nbformat": 4,
"nbformat_minor": 5
}
4 changes: 3 additions & 1 deletion tutorial_notebooks/rmia_attack_cifar10_tutorial.py.ipynb
Original file line number Diff line number Diff line change
Expand Up @@ -818,5 +818,7 @@
""
]
}
]
],
"nbformat": 4,
"nbformat_minor": 5
}
320 changes: 0 additions & 320 deletions tutorials/probabilistic_memorization_tutorial.py

This file was deleted.

Loading