Alert button
Picture for Daniel Lowd

Daniel Lowd

Alert button

Large Language Models Are Better Adversaries: Exploring Generative Clean-Label Backdoor Attacks Against Text Classifiers

Add code
Bookmark button
Alert button
Oct 28, 2023
Wencong You, Zayd Hammoudeh, Daniel Lowd

Figure 1 for Large Language Models Are Better Adversaries: Exploring Generative Clean-Label Backdoor Attacks Against Text Classifiers
Figure 2 for Large Language Models Are Better Adversaries: Exploring Generative Clean-Label Backdoor Attacks Against Text Classifiers
Figure 3 for Large Language Models Are Better Adversaries: Exploring Generative Clean-Label Backdoor Attacks Against Text Classifiers
Figure 4 for Large Language Models Are Better Adversaries: Exploring Generative Clean-Label Backdoor Attacks Against Text Classifiers
Viaarxiv icon

Feature Partition Aggregation: A Fast Certified Defense Against a Union of Sparse Adversarial Attacks

Add code
Bookmark button
Alert button
Feb 22, 2023
Zayd Hammoudeh, Daniel Lowd

Figure 1 for Feature Partition Aggregation: A Fast Certified Defense Against a Union of Sparse Adversarial Attacks
Figure 2 for Feature Partition Aggregation: A Fast Certified Defense Against a Union of Sparse Adversarial Attacks
Figure 3 for Feature Partition Aggregation: A Fast Certified Defense Against a Union of Sparse Adversarial Attacks
Figure 4 for Feature Partition Aggregation: A Fast Certified Defense Against a Union of Sparse Adversarial Attacks
Viaarxiv icon

Training Data Influence Analysis and Estimation: A Survey

Add code
Bookmark button
Alert button
Dec 09, 2022
Zayd Hammoudeh, Daniel Lowd

Figure 1 for Training Data Influence Analysis and Estimation: A Survey
Figure 2 for Training Data Influence Analysis and Estimation: A Survey
Figure 3 for Training Data Influence Analysis and Estimation: A Survey
Figure 4 for Training Data Influence Analysis and Estimation: A Survey
Viaarxiv icon

Reducing Certified Regression to Certified Classification

Add code
Bookmark button
Alert button
Aug 29, 2022
Zayd Hammoudeh, Daniel Lowd

Figure 1 for Reducing Certified Regression to Certified Classification
Figure 2 for Reducing Certified Regression to Certified Classification
Figure 3 for Reducing Certified Regression to Certified Classification
Figure 4 for Reducing Certified Regression to Certified Classification
Viaarxiv icon

Instance-Based Uncertainty Estimation for Gradient-Boosted Regression Trees

Add code
Bookmark button
Alert button
May 23, 2022
Jonathan Brophy, Daniel Lowd

Figure 1 for Instance-Based Uncertainty Estimation for Gradient-Boosted Regression Trees
Figure 2 for Instance-Based Uncertainty Estimation for Gradient-Boosted Regression Trees
Figure 3 for Instance-Based Uncertainty Estimation for Gradient-Boosted Regression Trees
Figure 4 for Instance-Based Uncertainty Estimation for Gradient-Boosted Regression Trees
Viaarxiv icon

Adapting and Evaluating Influence-Estimation Methods for Gradient-Boosted Decision Trees

Add code
Bookmark button
Alert button
Apr 30, 2022
Jonathan Brophy, Zayd Hammoudeh, Daniel Lowd

Figure 1 for Adapting and Evaluating Influence-Estimation Methods for Gradient-Boosted Decision Trees
Figure 2 for Adapting and Evaluating Influence-Estimation Methods for Gradient-Boosted Decision Trees
Figure 3 for Adapting and Evaluating Influence-Estimation Methods for Gradient-Boosted Decision Trees
Figure 4 for Adapting and Evaluating Influence-Estimation Methods for Gradient-Boosted Decision Trees
Viaarxiv icon

Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation

Add code
Bookmark button
Alert button
Jan 25, 2022
Zayd Hammoudeh, Daniel Lowd

Figure 1 for Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation
Figure 2 for Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation
Figure 3 for Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation
Figure 4 for Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation
Viaarxiv icon

Identifying Adversarial Attacks on Text Classifiers

Add code
Bookmark button
Alert button
Jan 21, 2022
Zhouhang Xie, Jonathan Brophy, Adam Noack, Wencong You, Kalyani Asthana, Carter Perkins, Sabrina Reis, Sameer Singh, Daniel Lowd

Figure 1 for Identifying Adversarial Attacks on Text Classifiers
Figure 2 for Identifying Adversarial Attacks on Text Classifiers
Figure 3 for Identifying Adversarial Attacks on Text Classifiers
Figure 4 for Identifying Adversarial Attacks on Text Classifiers
Viaarxiv icon

TREX: Tree-Ensemble Representer-Point Explanations

Add code
Bookmark button
Alert button
Sep 24, 2020
Jonathan Brophy, Daniel Lowd

Figure 1 for TREX: Tree-Ensemble Representer-Point Explanations
Figure 2 for TREX: Tree-Ensemble Representer-Point Explanations
Figure 3 for TREX: Tree-Ensemble Representer-Point Explanations
Figure 4 for TREX: Tree-Ensemble Representer-Point Explanations
Viaarxiv icon

DART: Data Addition and Removal Trees

Add code
Bookmark button
Alert button
Sep 11, 2020
Jonathan Brophy, Daniel Lowd

Figure 1 for DART: Data Addition and Removal Trees
Figure 2 for DART: Data Addition and Removal Trees
Figure 3 for DART: Data Addition and Removal Trees
Figure 4 for DART: Data Addition and Removal Trees
Viaarxiv icon