Alert button
Picture for David Lie

David Lie

Alert button

Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning

Add code
Bookmark button
Alert button
Jan 16, 2024
Wenjun Qiu, David Lie, Lisa Austin

Viaarxiv icon

Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails

Add code
Bookmark button
Alert button
Mar 03, 2023
Mu-Huan Chung, Lu Wang, Sharon Li, Yuhong Yang, Calvin Giang, Khilan Jerath, Abhay Raman, David Lie, Mark Chignell

Figure 1 for Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails
Figure 2 for Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails
Figure 3 for Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails
Figure 4 for Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails
Viaarxiv icon

In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning

Add code
Bookmark button
Alert button
Sep 22, 2022
Jiaqi Wang, Roei Schuster, Ilia Shumailov, David Lie, Nicolas Papernot

Figure 1 for In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Figure 2 for In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Figure 3 for In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Figure 4 for In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning
Viaarxiv icon

On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples

Add code
Bookmark button
Alert button
Aug 03, 2021
Adelin Travers, Lorna Licollari, Guanghan Wang, Varun Chandrasekaran, Adam Dziedzic, David Lie, Nicolas Papernot

Figure 1 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 2 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 3 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 4 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Viaarxiv icon

Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification

Add code
Bookmark button
Alert button
Aug 07, 2020
Wenjun Qiu, David Lie

Figure 1 for Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification
Figure 2 for Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification
Figure 3 for Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification
Figure 4 for Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification
Viaarxiv icon

Machine Unlearning

Add code
Bookmark button
Alert button
Dec 09, 2019
Lucas Bourtoule, Varun Chandrasekaran, Christopher Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, Nicolas Papernot

Figure 1 for Machine Unlearning
Figure 2 for Machine Unlearning
Figure 3 for Machine Unlearning
Figure 4 for Machine Unlearning
Viaarxiv icon

Ocasta: Clustering Configuration Settings For Error Recovery

Add code
Bookmark button
Alert button
Nov 02, 2017
Zhen Huang, David Lie

Figure 1 for Ocasta: Clustering Configuration Settings For Error Recovery
Figure 2 for Ocasta: Clustering Configuration Settings For Error Recovery
Figure 3 for Ocasta: Clustering Configuration Settings For Error Recovery
Figure 4 for Ocasta: Clustering Configuration Settings For Error Recovery
Viaarxiv icon