Alert button
Picture for Dali Kaafar

Dali Kaafar

Alert button

Practical, Private Assurance of the Value of Collaboration

Add code
Bookmark button
Alert button
Oct 04, 2023
Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar

Figure 1 for Practical, Private Assurance of the Value of Collaboration
Figure 2 for Practical, Private Assurance of the Value of Collaboration
Figure 3 for Practical, Private Assurance of the Value of Collaboration
Figure 4 for Practical, Private Assurance of the Value of Collaboration
Viaarxiv icon

On the Adversarial Inversion of Deep Biometric Representations

Add code
Bookmark button
Alert button
Apr 12, 2023
Gioacchino Tangari, Shreesh Keskar, Hassan Jameel Asghar, Dali Kaafar

Figure 1 for On the Adversarial Inversion of Deep Biometric Representations
Figure 2 for On the Adversarial Inversion of Deep Biometric Representations
Figure 3 for On the Adversarial Inversion of Deep Biometric Representations
Figure 4 for On the Adversarial Inversion of Deep Biometric Representations
Viaarxiv icon

DDoD: Dual Denial of Decision Attacks on Human-AI Teams

Add code
Bookmark button
Alert button
Dec 07, 2022
Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko

Figure 1 for DDoD: Dual Denial of Decision Attacks on Human-AI Teams
Viaarxiv icon

Unintended Memorization and Timing Attacks in Named Entity Recognition Models

Add code
Bookmark button
Alert button
Nov 04, 2022
Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Dali Kaafar

Figure 1 for Unintended Memorization and Timing Attacks in Named Entity Recognition Models
Figure 2 for Unintended Memorization and Timing Attacks in Named Entity Recognition Models
Figure 3 for Unintended Memorization and Timing Attacks in Named Entity Recognition Models
Figure 4 for Unintended Memorization and Timing Attacks in Named Entity Recognition Models
Viaarxiv icon

Data and Model Dependencies of Membership Inference Attack

Add code
Bookmark button
Alert button
Feb 17, 2020
Shakila Mahjabin Tonni, Farhad Farokhi, Dinusha Vatsalan, Dali Kaafar

Figure 1 for Data and Model Dependencies of Membership Inference Attack
Figure 2 for Data and Model Dependencies of Membership Inference Attack
Figure 3 for Data and Model Dependencies of Membership Inference Attack
Figure 4 for Data and Model Dependencies of Membership Inference Attack
Viaarxiv icon

Invisible Backdoor Attacks Against Deep Neural Networks

Add code
Bookmark button
Alert button
Sep 06, 2019
Shaofeng Li, Benjamin Zi Hao Zhao, Jiahao Yu, Minhui Xue, Dali Kaafar, Haojin Zhu

Figure 1 for Invisible Backdoor Attacks Against Deep Neural Networks
Figure 2 for Invisible Backdoor Attacks Against Deep Neural Networks
Figure 3 for Invisible Backdoor Attacks Against Deep Neural Networks
Figure 4 for Invisible Backdoor Attacks Against Deep Neural Networks
Viaarxiv icon

A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated

Add code
Bookmark button
Alert button
Jun 02, 2018
Loqman Salamatian, Dali Kaafar, Kavé Salamatian

Figure 1 for A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated
Figure 2 for A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated
Figure 3 for A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated
Figure 4 for A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated
Viaarxiv icon