Alert button
Picture for Esha Ghosh

Esha Ghosh

Alert button

Verifiable and Provably Secure Machine Unlearning

Add code
Bookmark button
Alert button
Oct 17, 2022
Thorsten Eisenhofer, Doreen Riepel, Varun Chandrasekaran, Esha Ghosh, Olga Ohrimenko, Nicolas Papernot

Figure 1 for Verifiable and Provably Secure Machine Unlearning
Figure 2 for Verifiable and Provably Secure Machine Unlearning
Figure 3 for Verifiable and Provably Secure Machine Unlearning
Figure 4 for Verifiable and Provably Secure Machine Unlearning
Viaarxiv icon

Active Data Pattern Extraction Attacks on Generative Language Models

Add code
Bookmark button
Alert button
Jul 14, 2022
Bargav Jayaraman, Esha Ghosh, Huseyin Inan, Melissa Chase, Sambuddha Roy, Wei Dai

Figure 1 for Active Data Pattern Extraction Attacks on Generative Language Models
Figure 2 for Active Data Pattern Extraction Attacks on Generative Language Models
Figure 3 for Active Data Pattern Extraction Attacks on Generative Language Models
Figure 4 for Active Data Pattern Extraction Attacks on Generative Language Models
Viaarxiv icon

Membership Inference on Word Embedding and Beyond

Add code
Bookmark button
Alert button
Jun 21, 2021
Saeed Mahloujifar, Huseyin A. Inan, Melissa Chase, Esha Ghosh, Marcello Hasegawa

Figure 1 for Membership Inference on Word Embedding and Beyond
Figure 2 for Membership Inference on Word Embedding and Beyond
Figure 3 for Membership Inference on Word Embedding and Beyond
Figure 4 for Membership Inference on Word Embedding and Beyond
Viaarxiv icon

Property Inference From Poisoning

Add code
Bookmark button
Alert button
Jan 26, 2021
Melissa Chase, Esha Ghosh, Saeed Mahloujifar

Figure 1 for Property Inference From Poisoning
Figure 2 for Property Inference From Poisoning
Figure 3 for Property Inference From Poisoning
Figure 4 for Property Inference From Poisoning
Viaarxiv icon