Alert button
Picture for Ahmed Salem

Ahmed Salem

Alert button

Microsoft Research

Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack

Add code
Bookmark button
Alert button
Apr 02, 2024
Mark Russinovich, Ahmed Salem, Ronen Eldan

Viaarxiv icon

Maatphor: Automated Variant Analysis for Prompt Injection Attacks

Add code
Bookmark button
Alert button
Dec 12, 2023
Ahmed Salem, Andrew Paverd, Boris Köpf

Viaarxiv icon

Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective

Add code
Bookmark button
Alert button
Nov 27, 2023
Lukas Wutschitz, Boris Köpf, Andrew Paverd, Saravan Rajmohan, Ahmed Salem, Shruti Tople, Santiago Zanella-Béguelin, Menglin Xia, Victor Rühle

Viaarxiv icon

Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning

Add code
Bookmark button
Alert button
Oct 17, 2023
Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem

Viaarxiv icon

Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models

Add code
Bookmark button
Alert button
Jun 23, 2023
Adel Elmahdy, Ahmed Salem

Figure 1 for Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models
Figure 2 for Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models
Figure 3 for Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models
Figure 4 for Deconstructing Classifiers: Towards A Data Reconstruction Attack Against Text Classification Models
Viaarxiv icon

Two-in-One: A Model Hijacking Attack Against Text Generation Models

Add code
Bookmark button
Alert button
May 12, 2023
Wai Man Si, Michael Backes, Yang Zhang, Ahmed Salem

Figure 1 for Two-in-One: A Model Hijacking Attack Against Text Generation Models
Figure 2 for Two-in-One: A Model Hijacking Attack Against Text Generation Models
Figure 3 for Two-in-One: A Model Hijacking Attack Against Text Generation Models
Figure 4 for Two-in-One: A Model Hijacking Attack Against Text Generation Models
Viaarxiv icon

Analyzing Leakage of Personally Identifiable Information in Language Models

Add code
Bookmark button
Alert button
Feb 01, 2023
Nils Lukas, Ahmed Salem, Robert Sim, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin

Figure 1 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 2 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 3 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 4 for Analyzing Leakage of Personally Identifiable Information in Language Models
Viaarxiv icon

SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning

Add code
Bookmark button
Alert button
Dec 21, 2022
Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin

Figure 1 for SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Figure 2 for SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Figure 3 for SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Viaarxiv icon

UnGANable: Defending Against GAN-based Face Manipulation

Add code
Bookmark button
Alert button
Oct 03, 2022
Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang

Figure 1 for UnGANable: Defending Against GAN-based Face Manipulation
Figure 2 for UnGANable: Defending Against GAN-based Face Manipulation
Figure 3 for UnGANable: Defending Against GAN-based Face Manipulation
Figure 4 for UnGANable: Defending Against GAN-based Face Manipulation
Viaarxiv icon

Bayesian Estimation of Differential Privacy

Add code
Bookmark button
Alert button
Jun 15, 2022
Santiago Zanella-Béguelin, Lukas Wutschitz, Shruti Tople, Ahmed Salem, Victor Rühle, Andrew Paverd, Mohammad Naseri, Boris Köpf, Daniel Jones

Figure 1 for Bayesian Estimation of Differential Privacy
Figure 2 for Bayesian Estimation of Differential Privacy
Figure 3 for Bayesian Estimation of Differential Privacy
Figure 4 for Bayesian Estimation of Differential Privacy
Viaarxiv icon