Alert button
Picture for Chris Mesterharm

Chris Mesterharm

Alert button

ReFace: Real-time Adversarial Attacks on Face Recognition Systems

Add code
Bookmark button
Alert button
Jun 09, 2022
Shehzeen Hussain, Todd Huster, Chris Mesterharm, Paarth Neekhara, Kevin An, Malhar Jere, Harshvardhan Sikka, Farinaz Koushanfar

Figure 1 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 2 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 3 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 4 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Viaarxiv icon

Privacy Leakage Avoidance with Switching Ensembles

Add code
Bookmark button
Alert button
Nov 18, 2019
Rauf Izmailov, Peter Lin, Chris Mesterharm, Samyadeep Basu

Figure 1 for Privacy Leakage Avoidance with Switching Ensembles
Figure 2 for Privacy Leakage Avoidance with Switching Ensembles
Figure 3 for Privacy Leakage Avoidance with Switching Ensembles
Figure 4 for Privacy Leakage Avoidance with Switching Ensembles
Viaarxiv icon

Membership Model Inversion Attacks for Deep Networks

Add code
Bookmark button
Alert button
Oct 09, 2019
Samyadeep Basu, Rauf Izmailov, Chris Mesterharm

Figure 1 for Membership Model Inversion Attacks for Deep Networks
Figure 2 for Membership Model Inversion Attacks for Deep Networks
Figure 3 for Membership Model Inversion Attacks for Deep Networks
Figure 4 for Membership Model Inversion Attacks for Deep Networks
Viaarxiv icon

A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary

Add code
Bookmark button
Alert button
Feb 19, 2019
Chris Mesterharm, Rauf Izmailov, Scott Alexander, Simon Tsang

Figure 1 for A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary
Figure 2 for A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary
Figure 3 for A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary
Figure 4 for A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary
Viaarxiv icon