Picture for El-Mahdi El-Mhamdi

El-Mahdi El-Mhamdi

Byzantine Machine Learning: MultiKrum and an optimal notion of robustness

Add code
Feb 03, 2026
Viaarxiv icon

Winter Soldier: Backdooring Language Models at Pre-Training with Indirect Data Poisoning

Add code
Jun 17, 2025
Figure 1 for Winter Soldier: Backdooring Language Models at Pre-Training with Indirect Data Poisoning
Figure 2 for Winter Soldier: Backdooring Language Models at Pre-Training with Indirect Data Poisoning
Figure 3 for Winter Soldier: Backdooring Language Models at Pre-Training with Indirect Data Poisoning
Figure 4 for Winter Soldier: Backdooring Language Models at Pre-Training with Indirect Data Poisoning
Viaarxiv icon

The Strong, Weak and Benign Goodhart's law. An independence-free and paradigm-agnostic formalisation

Add code
May 29, 2025
Figure 1 for The Strong, Weak and Benign Goodhart's law. An independence-free and paradigm-agnostic formalisation
Figure 2 for The Strong, Weak and Benign Goodhart's law. An independence-free and paradigm-agnostic formalisation
Figure 3 for The Strong, Weak and Benign Goodhart's law. An independence-free and paradigm-agnostic formalisation
Figure 4 for The Strong, Weak and Benign Goodhart's law. An independence-free and paradigm-agnostic formalisation
Viaarxiv icon

Targeted Data Poisoning for Black-Box Audio Datasets Ownership Verification

Add code
Mar 13, 2025
Figure 1 for Targeted Data Poisoning for Black-Box Audio Datasets Ownership Verification
Figure 2 for Targeted Data Poisoning for Black-Box Audio Datasets Ownership Verification
Figure 3 for Targeted Data Poisoning for Black-Box Audio Datasets Ownership Verification
Figure 4 for Targeted Data Poisoning for Black-Box Audio Datasets Ownership Verification
Viaarxiv icon

On the Byzantine Fault Tolerance of signSGD with Majority Vote

Add code
Feb 26, 2025
Figure 1 for On the Byzantine Fault Tolerance of signSGD with Majority Vote
Figure 2 for On the Byzantine Fault Tolerance of signSGD with Majority Vote
Figure 3 for On the Byzantine Fault Tolerance of signSGD with Majority Vote
Figure 4 for On the Byzantine Fault Tolerance of signSGD with Majority Vote
Viaarxiv icon

Inverting Gradient Attacks Naturally Makes Data Poisons: An Availability Attack on Neural Networks

Add code
Oct 28, 2024
Figure 1 for Inverting Gradient Attacks Naturally Makes Data Poisons: An Availability Attack on Neural Networks
Figure 2 for Inverting Gradient Attacks Naturally Makes Data Poisons: An Availability Attack on Neural Networks
Figure 3 for Inverting Gradient Attacks Naturally Makes Data Poisons: An Availability Attack on Neural Networks
Figure 4 for Inverting Gradient Attacks Naturally Makes Data Poisons: An Availability Attack on Neural Networks
Viaarxiv icon

On Goodhart's law, with an application to value alignment

Add code
Oct 12, 2024
Viaarxiv icon

Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning

Add code
Oct 09, 2024
Figure 1 for Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning
Figure 2 for Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning
Figure 3 for Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning
Figure 4 for Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning
Viaarxiv icon

SoK: On the Impossible Security of Very Large Foundation Models

Add code
Sep 30, 2022
Viaarxiv icon

Garfield: System Support for Byzantine Machine Learning

Add code
Oct 12, 2020
Figure 1 for Garfield: System Support for Byzantine Machine Learning
Figure 2 for Garfield: System Support for Byzantine Machine Learning
Figure 3 for Garfield: System Support for Byzantine Machine Learning
Figure 4 for Garfield: System Support for Byzantine Machine Learning
Viaarxiv icon