Alert button
Picture for David Evans

David Evans

Alert button

Dissecting Distribution Inference

Add code
Bookmark button
Alert button
Dec 15, 2022
Anshuman Suri, Yifu Lu, Yanjin Chen, David Evans

Figure 1 for Dissecting Distribution Inference
Figure 2 for Dissecting Distribution Inference
Figure 3 for Dissecting Distribution Inference
Figure 4 for Dissecting Distribution Inference
Viaarxiv icon

Are Attribute Inference Attacks Just Imputation?

Add code
Bookmark button
Alert button
Sep 02, 2022
Bargav Jayaraman, David Evans

Figure 1 for Are Attribute Inference Attacks Just Imputation?
Figure 2 for Are Attribute Inference Attacks Just Imputation?
Figure 3 for Are Attribute Inference Attacks Just Imputation?
Figure 4 for Are Attribute Inference Attacks Just Imputation?
Viaarxiv icon

Memorization in NLP Fine-tuning Methods

Add code
Bookmark button
Alert button
May 25, 2022
Fatemehsadat Mireshghallah, Archit Uniyal, Tianhao Wang, David Evans, Taylor Berg-Kirkpatrick

Figure 1 for Memorization in NLP Fine-tuning Methods
Figure 2 for Memorization in NLP Fine-tuning Methods
Figure 3 for Memorization in NLP Fine-tuning Methods
Figure 4 for Memorization in NLP Fine-tuning Methods
Viaarxiv icon

Formalizing and Estimating Distribution Inference Risks

Add code
Bookmark button
Alert button
Sep 24, 2021
Anshuman Suri, David Evans

Figure 1 for Formalizing and Estimating Distribution Inference Risks
Figure 2 for Formalizing and Estimating Distribution Inference Risks
Figure 3 for Formalizing and Estimating Distribution Inference Risks
Figure 4 for Formalizing and Estimating Distribution Inference Risks
Viaarxiv icon

Incorporating Label Uncertainty in Understanding Adversarial Robustness

Add code
Bookmark button
Alert button
Jul 07, 2021
Xiao Zhang, David Evans

Figure 1 for Incorporating Label Uncertainty in Understanding Adversarial Robustness
Figure 2 for Incorporating Label Uncertainty in Understanding Adversarial Robustness
Figure 3 for Incorporating Label Uncertainty in Understanding Adversarial Robustness
Figure 4 for Incorporating Label Uncertainty in Understanding Adversarial Robustness
Viaarxiv icon

Formalizing Distribution Inference Risks

Add code
Bookmark button
Alert button
Jun 07, 2021
Anshuman Suri, David Evans

Figure 1 for Formalizing Distribution Inference Risks
Figure 2 for Formalizing Distribution Inference Risks
Viaarxiv icon

Stealthy Backdoors as Compression Artifacts

Add code
Bookmark button
Alert button
Apr 30, 2021
Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans

Figure 1 for Stealthy Backdoors as Compression Artifacts
Figure 2 for Stealthy Backdoors as Compression Artifacts
Figure 3 for Stealthy Backdoors as Compression Artifacts
Figure 4 for Stealthy Backdoors as Compression Artifacts
Viaarxiv icon

Improved Estimation of Concentration Under $\ell_p$-Norm Distance Metrics Using Half Spaces

Add code
Bookmark button
Alert button
Mar 24, 2021
Jack Prescott, Xiao Zhang, David Evans

Figure 1 for Improved Estimation of Concentration Under $\ell_p$-Norm Distance Metrics Using Half Spaces
Figure 2 for Improved Estimation of Concentration Under $\ell_p$-Norm Distance Metrics Using Half Spaces
Figure 3 for Improved Estimation of Concentration Under $\ell_p$-Norm Distance Metrics Using Half Spaces
Viaarxiv icon

Finding Friends and Flipping Frenemies: Automatic Paraphrase Dataset Augmentation Using Graph Theory

Add code
Bookmark button
Alert button
Nov 03, 2020
Hannah Chen, Yangfeng Ji, David Evans

Figure 1 for Finding Friends and Flipping Frenemies: Automatic Paraphrase Dataset Augmentation Using Graph Theory
Figure 2 for Finding Friends and Flipping Frenemies: Automatic Paraphrase Dataset Augmentation Using Graph Theory
Figure 3 for Finding Friends and Flipping Frenemies: Automatic Paraphrase Dataset Augmentation Using Graph Theory
Figure 4 for Finding Friends and Flipping Frenemies: Automatic Paraphrase Dataset Augmentation Using Graph Theory
Viaarxiv icon

Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds

Add code
Bookmark button
Alert button
Jun 30, 2020
Fnu Suya, Saeed Mahloujifar, David Evans, Yuan Tian

Figure 1 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Figure 2 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Figure 3 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Figure 4 for Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds
Viaarxiv icon