I tried to reimplement the results in pytorch a bit like what's done in this: https://github.com/GeorgeTzannetos/ml-leaks-pytorch repo. However both of our implementations get a maximum of 55% precision for the attack (Attacker 1) on cifar-10. Did anyone else try to reproduce the paper and have similar experience ?