Picture for Ali Shahin Shamsabadi

Ali Shahin Shamsabadi

P4: Towards private, personalized, and Peer-to-Peer learning

Add code
May 27, 2024
Viaarxiv icon

Identifying and Mitigating Privacy Risks Stemming from Language Models: A Survey

Add code
Sep 27, 2023
Figure 1 for Identifying and Mitigating Privacy Risks Stemming from Language Models: A Survey
Figure 2 for Identifying and Mitigating Privacy Risks Stemming from Language Models: A Survey
Viaarxiv icon

Is Federated Learning a Practical PET Yet?

Add code
Jan 09, 2023
Figure 1 for Is Federated Learning a Practical PET Yet?
Figure 2 for Is Federated Learning a Practical PET Yet?
Figure 3 for Is Federated Learning a Practical PET Yet?
Figure 4 for Is Federated Learning a Practical PET Yet?
Viaarxiv icon

Private Multi-Winner Voting for Machine Learning

Add code
Nov 23, 2022
Figure 1 for Private Multi-Winner Voting for Machine Learning
Figure 2 for Private Multi-Winner Voting for Machine Learning
Figure 3 for Private Multi-Winner Voting for Machine Learning
Figure 4 for Private Multi-Winner Voting for Machine Learning
Viaarxiv icon

On the reversibility of adversarial attacks

Add code
Jun 01, 2022
Figure 1 for On the reversibility of adversarial attacks
Figure 2 for On the reversibility of adversarial attacks
Figure 3 for On the reversibility of adversarial attacks
Figure 4 for On the reversibility of adversarial attacks
Viaarxiv icon

GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation

Add code
Mar 02, 2022
Figure 1 for GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation
Figure 2 for GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation
Figure 3 for GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation
Figure 4 for GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation
Viaarxiv icon

Differentially Private Speaker Anonymization

Add code
Feb 23, 2022
Figure 1 for Differentially Private Speaker Anonymization
Figure 2 for Differentially Private Speaker Anonymization
Figure 3 for Differentially Private Speaker Anonymization
Figure 4 for Differentially Private Speaker Anonymization
Viaarxiv icon

Pipe Overflow: Smashing Voice Authentication for Fun and Profit

Add code
Feb 06, 2022
Figure 1 for Pipe Overflow: Smashing Voice Authentication for Fun and Profit
Figure 2 for Pipe Overflow: Smashing Voice Authentication for Fun and Profit
Figure 3 for Pipe Overflow: Smashing Voice Authentication for Fun and Profit
Figure 4 for Pipe Overflow: Smashing Voice Authentication for Fun and Profit
Viaarxiv icon

When the Curious Abandon Honesty: Federated Learning Is Not Private

Add code
Dec 06, 2021
Figure 1 for When the Curious Abandon Honesty: Federated Learning Is Not Private
Figure 2 for When the Curious Abandon Honesty: Federated Learning Is Not Private
Figure 3 for When the Curious Abandon Honesty: Federated Learning Is Not Private
Figure 4 for When the Curious Abandon Honesty: Federated Learning Is Not Private
Viaarxiv icon

FoolHD: Fooling speaker identification by Highly imperceptible adversarial Disturbances

Add code
Nov 17, 2020
Figure 1 for FoolHD: Fooling speaker identification by Highly imperceptible adversarial Disturbances
Figure 2 for FoolHD: Fooling speaker identification by Highly imperceptible adversarial Disturbances
Figure 3 for FoolHD: Fooling speaker identification by Highly imperceptible adversarial Disturbances
Viaarxiv icon