Alert button
Picture for Benny Pinkas

Benny Pinkas

Alert button

ScionFL: Secure Quantized Aggregation for Federated Learning

Add code
Bookmark button
Alert button
Oct 13, 2022
Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai

Figure 1 for ScionFL: Secure Quantized Aggregation for Federated Learning
Figure 2 for ScionFL: Secure Quantized Aggregation for Federated Learning
Figure 3 for ScionFL: Secure Quantized Aggregation for Federated Learning
Figure 4 for ScionFL: Secure Quantized Aggregation for Federated Learning
Viaarxiv icon

Fairness in the Eyes of the Data: Certifying Machine-Learning Models

Add code
Bookmark button
Alert button
Sep 03, 2020
Shahar Segal, Yossi Adi, Benny Pinkas, Carsten Baum, Chaya Ganesh, Joseph Keshet

Figure 1 for Fairness in the Eyes of the Data: Certifying Machine-Learning Models
Figure 2 for Fairness in the Eyes of the Data: Certifying Machine-Learning Models
Figure 3 for Fairness in the Eyes of the Data: Certifying Machine-Learning Models
Figure 4 for Fairness in the Eyes of the Data: Certifying Machine-Learning Models
Viaarxiv icon

Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring

Add code
Bookmark button
Alert button
Jun 11, 2018
Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, Joseph Keshet

Figure 1 for Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring
Figure 2 for Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring
Figure 3 for Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring
Figure 4 for Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring
Viaarxiv icon

Deceiving End-to-End Deep Learning Malware Detectors using Adversarial Examples

Add code
Bookmark button
Alert button
May 13, 2018
Felix Kreuk, Assi Barak, Shir Aviv-Reuven, Moran Baruch, Benny Pinkas, Joseph Keshet

Figure 1 for Deceiving End-to-End Deep Learning Malware Detectors using Adversarial Examples
Viaarxiv icon