Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation Authors: Han Zhao, Jianfeng Chi, Yuan Tian, Geoffrey J. Gordon | Published: 2019-06-19 | Updated: 2020-10-25 Privacy ProtectionMembership InferenceOptimization Problem 2019.06.19 2025.05.28 Literature Database
DAWN: Dynamic Adversarial Watermarking of Neural Networks Authors: Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan | Published: 2019-06-03 | Updated: 2021-07-16 Membership InferenceAdversarial ExampleWatermarking Technology 2019.06.03 2025.05.28 Literature Database
Disparate Vulnerability to Membership Inference Attacks Authors: Bogdan Kulynych, Mohammad Yaghini, Giovanni Cherubin, Michael Veale, Carmela Troncoso | Published: 2019-06-02 | Updated: 2021-09-16 Dataset AnalysisPrivacy AssessmentMembership Inference 2019.06.02 2025.05.28 Literature Database
Bypassing Backdoor Detection Algorithms in Deep Learning Authors: Te Juin Lester Tan, Reza Shokri | Published: 2019-05-31 | Updated: 2020-06-06 Pruning MethodMembership InferenceAdversarial Attack Methods 2019.05.31 2025.05.28 Literature Database
Quantifying the Privacy Risks of Learning High-Dimensional Graphical Models Authors: Sasi Kumar Murakonda, Reza Shokri, George Theodorakopoulos | Published: 2019-05-29 | Updated: 2021-02-17 Privacy Enhancing TechnologyMembership InferenceInformation-Theoretic Evaluation 2019.05.29 2025.05.28 Literature Database
Privacy Risks of Securing Machine Learning Models against Adversarial Examples Authors: Liwei Song, Reza Shokri, Prateek Mittal | Published: 2019-05-24 | Updated: 2019-08-25 Backdoor AttackMembership InferenceAdversarial Example 2019.05.24 2025.05.28 Literature Database
A framework for the extraction of Deep Neural Networks by leveraging public data Authors: Soham Pal, Yash Gupta, Aditya Shukla, Aditya Kanade, Shirish Shevade, Vinod Ganapathy | Published: 2019-05-22 Data CollectionMembership InferenceModel Performance Evaluation 2019.05.22 2025.05.28 Literature Database
Evaluating Differentially Private Machine Learning in Practice Authors: Bargav Jayaraman, David Evans | Published: 2019-02-24 | Updated: 2019-08-12 Membership InferenceDifferential PrivacyCauses of Information Leakage 2019.02.24 2025.05.28 Literature Database
Applications of Machine Learning in Cryptography: A Survey Authors: Mohammed M. Alani | Published: 2019-02-11 Membership InferenceTaxonomy of AttacksHistory of Cryptography 2019.02.11 2025.05.28 Literature Database
FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions Authors: Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S L Wei, Tao Wan, Feng Wu | Published: 2018-11-20 Trigger DetectionMembership InferenceCryptographic Protocol 2018.11.20 2025.05.28 Literature Database