Picture for Alexander Ziller

Alexander Ziller

Visual Privacy Auditing with Diffusion Models

Add code
Mar 12, 2024
Figure 1 for Visual Privacy Auditing with Diffusion Models
Figure 2 for Visual Privacy Auditing with Diffusion Models
Figure 3 for Visual Privacy Auditing with Diffusion Models
Figure 4 for Visual Privacy Auditing with Diffusion Models
Viaarxiv icon

Bounding Reconstruction Attack Success of Adversaries Without Data Priors

Add code
Feb 20, 2024
Figure 1 for Bounding Reconstruction Attack Success of Adversaries Without Data Priors
Figure 2 for Bounding Reconstruction Attack Success of Adversaries Without Data Priors
Figure 3 for Bounding Reconstruction Attack Success of Adversaries Without Data Priors
Figure 4 for Bounding Reconstruction Attack Success of Adversaries Without Data Priors
Viaarxiv icon

How Low Can You Go? Surfacing Prototypical In-Distribution Samples for Unsupervised Anomaly Detection

Add code
Dec 06, 2023
Figure 1 for How Low Can You Go? Surfacing Prototypical In-Distribution Samples for Unsupervised Anomaly Detection
Figure 2 for How Low Can You Go? Surfacing Prototypical In-Distribution Samples for Unsupervised Anomaly Detection
Figure 3 for How Low Can You Go? Surfacing Prototypical In-Distribution Samples for Unsupervised Anomaly Detection
Figure 4 for How Low Can You Go? Surfacing Prototypical In-Distribution Samples for Unsupervised Anomaly Detection
Viaarxiv icon

Reconciling AI Performance and Data Reconstruction Resilience for Medical Imaging

Add code
Dec 05, 2023
Viaarxiv icon

Bias-Aware Minimisation: Understanding and Mitigating Estimator Bias in Private SGD

Add code
Aug 23, 2023
Figure 1 for Bias-Aware Minimisation: Understanding and Mitigating Estimator Bias in Private SGD
Figure 2 for Bias-Aware Minimisation: Understanding and Mitigating Estimator Bias in Private SGD
Figure 3 for Bias-Aware Minimisation: Understanding and Mitigating Estimator Bias in Private SGD
Figure 4 for Bias-Aware Minimisation: Understanding and Mitigating Estimator Bias in Private SGD
Viaarxiv icon

Explainable 2D Vision Models for 3D Medical Data

Add code
Jul 13, 2023
Figure 1 for Explainable 2D Vision Models for 3D Medical Data
Figure 2 for Explainable 2D Vision Models for 3D Medical Data
Figure 3 for Explainable 2D Vision Models for 3D Medical Data
Figure 4 for Explainable 2D Vision Models for 3D Medical Data
Viaarxiv icon

Body Fat Estimation from Surface Meshes using Graph Neural Networks

Add code
Jul 13, 2023
Figure 1 for Body Fat Estimation from Surface Meshes using Graph Neural Networks
Figure 2 for Body Fat Estimation from Surface Meshes using Graph Neural Networks
Figure 3 for Body Fat Estimation from Surface Meshes using Graph Neural Networks
Figure 4 for Body Fat Estimation from Surface Meshes using Graph Neural Networks
Viaarxiv icon

Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy

Add code
Jul 08, 2023
Figure 1 for Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy
Figure 2 for Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy
Figure 3 for Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy
Figure 4 for Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy
Viaarxiv icon

Private, fair and accurate: Training large-scale, privacy-preserving AI models in radiology

Add code
Feb 03, 2023
Figure 1 for Private, fair and accurate: Training large-scale, privacy-preserving AI models in radiology
Figure 2 for Private, fair and accurate: Training large-scale, privacy-preserving AI models in radiology
Figure 3 for Private, fair and accurate: Training large-scale, privacy-preserving AI models in radiology
Figure 4 for Private, fair and accurate: Training large-scale, privacy-preserving AI models in radiology
Viaarxiv icon

How Do Input Attributes Impact the Privacy Loss in Differential Privacy?

Add code
Nov 18, 2022
Figure 1 for How Do Input Attributes Impact the Privacy Loss in Differential Privacy?
Figure 2 for How Do Input Attributes Impact the Privacy Loss in Differential Privacy?
Figure 3 for How Do Input Attributes Impact the Privacy Loss in Differential Privacy?
Figure 4 for How Do Input Attributes Impact the Privacy Loss in Differential Privacy?
Viaarxiv icon