Alert button
Picture for Alina Oprea

Alina Oprea

Alert button

User Inference Attacks on Large Language Models

Add code
Bookmark button
Alert button
Oct 13, 2023
Nikhil Kandpal, Krishna Pillutla, Alina Oprea, Peter Kairouz, Christopher A. Choquette-Choo, Zheng Xu

Figure 1 for User Inference Attacks on Large Language Models
Figure 2 for User Inference Attacks on Large Language Models
Figure 3 for User Inference Attacks on Large Language Models
Figure 4 for User Inference Attacks on Large Language Models
Viaarxiv icon

Chameleon: Increasing Label-Only Membership Leakage with Adaptive Poisoning

Add code
Bookmark button
Alert button
Oct 05, 2023
Harsh Chaudhari, Giorgio Severi, Alina Oprea, Jonathan Ullman

Viaarxiv icon

Dropout Attacks

Add code
Bookmark button
Alert button
Sep 04, 2023
Andrew Yuan, Alina Oprea, Cheng Tan

Figure 1 for Dropout Attacks
Figure 2 for Dropout Attacks
Figure 3 for Dropout Attacks
Figure 4 for Dropout Attacks
Viaarxiv icon

Poisoning Network Flow Classifiers

Add code
Bookmark button
Alert button
Jun 02, 2023
Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer

Figure 1 for Poisoning Network Flow Classifiers
Figure 2 for Poisoning Network Flow Classifiers
Figure 3 for Poisoning Network Flow Classifiers
Figure 4 for Poisoning Network Flow Classifiers
Viaarxiv icon

TMI! Finetuned Models Leak Private Information from their Pretraining Data

Add code
Bookmark button
Alert button
Jun 01, 2023
John Abascal, Stanley Wu, Alina Oprea, Jonathan Ullman

Figure 1 for TMI! Finetuned Models Leak Private Information from their Pretraining Data
Figure 2 for TMI! Finetuned Models Leak Private Information from their Pretraining Data
Figure 3 for TMI! Finetuned Models Leak Private Information from their Pretraining Data
Figure 4 for TMI! Finetuned Models Leak Private Information from their Pretraining Data
Viaarxiv icon

Unleashing the Power of Randomization in Auditing Differentially Private ML

Add code
Bookmark button
Alert button
May 29, 2023
Krishna Pillutla, Galen Andrew, Peter Kairouz, H. Brendan McMahan, Alina Oprea, Sewoong Oh

Figure 1 for Unleashing the Power of Randomization in Auditing Differentially Private ML
Figure 2 for Unleashing the Power of Randomization in Auditing Differentially Private ML
Figure 3 for Unleashing the Power of Randomization in Auditing Differentially Private ML
Figure 4 for Unleashing the Power of Randomization in Auditing Differentially Private ML
Viaarxiv icon

One-shot Empirical Privacy Estimation for Federated Learning

Add code
Bookmark button
Alert button
Feb 08, 2023
Galen Andrew, Peter Kairouz, Sewoong Oh, Alina Oprea, H. Brendan McMahan, Vinith Suriyakumar

Figure 1 for One-shot Empirical Privacy Estimation for Federated Learning
Figure 2 for One-shot Empirical Privacy Estimation for Federated Learning
Figure 3 for One-shot Empirical Privacy Estimation for Federated Learning
Figure 4 for One-shot Empirical Privacy Estimation for Federated Learning
Viaarxiv icon

Backdoor Attacks in Peer-to-Peer Federated Learning

Add code
Bookmark button
Alert button
Jan 23, 2023
Gokberk Yar, Cristina Nita-Rotaru, Alina Oprea

Figure 1 for Backdoor Attacks in Peer-to-Peer Federated Learning
Figure 2 for Backdoor Attacks in Peer-to-Peer Federated Learning
Figure 3 for Backdoor Attacks in Peer-to-Peer Federated Learning
Figure 4 for Backdoor Attacks in Peer-to-Peer Federated Learning
Viaarxiv icon

Network-Level Adversaries in Federated Learning

Add code
Bookmark button
Alert button
Aug 27, 2022
Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru

Figure 1 for Network-Level Adversaries in Federated Learning
Figure 2 for Network-Level Adversaries in Federated Learning
Figure 3 for Network-Level Adversaries in Federated Learning
Figure 4 for Network-Level Adversaries in Federated Learning
Viaarxiv icon

SNAP: Efficient Extraction of Private Properties with Poisoning

Add code
Bookmark button
Alert button
Aug 25, 2022
Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman

Figure 1 for SNAP: Efficient Extraction of Private Properties with Poisoning
Figure 2 for SNAP: Efficient Extraction of Private Properties with Poisoning
Figure 3 for SNAP: Efficient Extraction of Private Properties with Poisoning
Figure 4 for SNAP: Efficient Extraction of Private Properties with Poisoning
Viaarxiv icon