Alert button
Picture for Alexandre Sablayrolles

Alexandre Sablayrolles

Alert button

Mixtral of Experts

Add code
Bookmark button
Alert button
Jan 08, 2024
Albert Q. Jiang, Alexandre Sablayrolles, Antoine Roux, Arthur Mensch, Blanche Savary, Chris Bamford, Devendra Singh Chaplot, Diego de las Casas, Emma Bou Hanna, Florian Bressand, Gianna Lengyel, Guillaume Bour, Guillaume Lample, Lélio Renard Lavaud, Lucile Saulnier, Marie-Anne Lachaux, Pierre Stock, Sandeep Subramanian, Sophia Yang, Szymon Antoniak, Teven Le Scao, Théophile Gervet, Thibaut Lavril, Thomas Wang, Timothée Lacroix, William El Sayed

Viaarxiv icon

Mistral 7B

Add code
Bookmark button
Alert button
Oct 10, 2023
Albert Q. Jiang, Alexandre Sablayrolles, Arthur Mensch, Chris Bamford, Devendra Singh Chaplot, Diego de las Casas, Florian Bressand, Gianna Lengyel, Guillaume Lample, Lucile Saulnier, Lélio Renard Lavaud, Marie-Anne Lachaux, Pierre Stock, Teven Le Scao, Thibaut Lavril, Thomas Wang, Timothée Lacroix, William El Sayed

Viaarxiv icon

Privately generating tabular data using language models

Add code
Bookmark button
Alert button
Jun 07, 2023
Alexandre Sablayrolles, Yue Wang, Brian Karrer

Figure 1 for Privately generating tabular data using language models
Figure 2 for Privately generating tabular data using language models
Figure 3 for Privately generating tabular data using language models
Figure 4 for Privately generating tabular data using language models
Viaarxiv icon

Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano

Add code
Bookmark button
Alert button
Oct 24, 2022
Chuan Guo, Alexandre Sablayrolles, Maziar Sanjabi

Figure 1 for Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano
Figure 2 for Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano
Figure 3 for Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano
Figure 4 for Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano
Viaarxiv icon

TAN without a burn: Scaling Laws of DP-SGD

Add code
Bookmark button
Alert button
Oct 07, 2022
Tom Sander, Pierre Stock, Alexandre Sablayrolles

Figure 1 for TAN without a burn: Scaling Laws of DP-SGD
Figure 2 for TAN without a burn: Scaling Laws of DP-SGD
Figure 3 for TAN without a burn: Scaling Laws of DP-SGD
Figure 4 for TAN without a burn: Scaling Laws of DP-SGD
Viaarxiv icon

CANIFE: Crafting Canaries for Empirical Privacy Measurement in Federated Learning

Add code
Bookmark button
Alert button
Oct 06, 2022
Samuel Maddock, Alexandre Sablayrolles, Pierre Stock

Figure 1 for CANIFE: Crafting Canaries for Empirical Privacy Measurement in Federated Learning
Figure 2 for CANIFE: Crafting Canaries for Empirical Privacy Measurement in Federated Learning
Figure 3 for CANIFE: Crafting Canaries for Empirical Privacy Measurement in Federated Learning
Figure 4 for CANIFE: Crafting Canaries for Empirical Privacy Measurement in Federated Learning
Viaarxiv icon

Optimal Membership Inference Bounds for Adaptive Composition of Sampled Gaussian Mechanisms

Add code
Bookmark button
Alert button
Apr 12, 2022
Saeed Mahloujifar, Alexandre Sablayrolles, Graham Cormode, Somesh Jha

Figure 1 for Optimal Membership Inference Bounds for Adaptive Composition of Sampled Gaussian Mechanisms
Figure 2 for Optimal Membership Inference Bounds for Adaptive Composition of Sampled Gaussian Mechanisms
Figure 3 for Optimal Membership Inference Bounds for Adaptive Composition of Sampled Gaussian Mechanisms
Viaarxiv icon

Defending against Reconstruction Attacks with Rényi Differential Privacy

Add code
Bookmark button
Alert button
Feb 15, 2022
Pierre Stock, Igor Shilov, Ilya Mironov, Alexandre Sablayrolles

Figure 1 for Defending against Reconstruction Attacks with Rényi Differential Privacy
Figure 2 for Defending against Reconstruction Attacks with Rényi Differential Privacy
Figure 3 for Defending against Reconstruction Attacks with Rényi Differential Privacy
Figure 4 for Defending against Reconstruction Attacks with Rényi Differential Privacy
Viaarxiv icon

Watermarking Images in Self-Supervised Latent Spaces

Add code
Bookmark button
Alert button
Dec 17, 2021
Pierre Fernandez, Alexandre Sablayrolles, Teddy Furon, Hervé Jégou, Matthijs Douze

Figure 1 for Watermarking Images in Self-Supervised Latent Spaces
Figure 2 for Watermarking Images in Self-Supervised Latent Spaces
Figure 3 for Watermarking Images in Self-Supervised Latent Spaces
Figure 4 for Watermarking Images in Self-Supervised Latent Spaces
Viaarxiv icon

Nearest neighbor search with compact codes: A decoder perspective

Add code
Bookmark button
Alert button
Dec 17, 2021
Kenza Amara, Matthijs Douze, Alexandre Sablayrolles, Hervé Jégou

Figure 1 for Nearest neighbor search with compact codes: A decoder perspective
Figure 2 for Nearest neighbor search with compact codes: A decoder perspective
Figure 3 for Nearest neighbor search with compact codes: A decoder perspective
Figure 4 for Nearest neighbor search with compact codes: A decoder perspective
Viaarxiv icon