Alert button
Picture for Franziska Boenisch

Franziska Boenisch

Alert button

Regulation Games for Trustworthy Machine Learning

Feb 05, 2024
Mohammad Yaghini, Patty Liu, Franziska Boenisch, Nicolas Papernot

Viaarxiv icon

Personalized Differential Privacy for Ridge Regression

Jan 30, 2024
Krishna Acharya, Franziska Boenisch, Rakshit Naidu, Juba Ziani

Viaarxiv icon

Memorization in Self-Supervised Learning Improves Downstream Generalization

Jan 24, 2024
Wenhao Wang, Muhammad Ahmad Kaleem, Adam Dziedzic, Michael Backes, Nicolas Papernot, Franziska Boenisch

Viaarxiv icon

Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders

Oct 12, 2023
Jan Dubiński, Stanisław Pawlak, Franziska Boenisch, Tomasz Trzciński, Adam Dziedzic

Figure 1 for Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Figure 2 for Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Figure 3 for Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Figure 4 for Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Viaarxiv icon

Augment then Smooth: Reconciling Differential Privacy with Certified Robustness

Jun 14, 2023
Jiapeng Wu, Atiyeh Ashari Ghomi, David Glukhov, Jesse C. Cresswell, Franziska Boenisch, Nicolas Papernot

Figure 1 for Augment then Smooth: Reconciling Differential Privacy with Certified Robustness
Figure 2 for Augment then Smooth: Reconciling Differential Privacy with Certified Robustness
Figure 3 for Augment then Smooth: Reconciling Differential Privacy with Certified Robustness
Figure 4 for Augment then Smooth: Reconciling Differential Privacy with Certified Robustness
Viaarxiv icon

Flocks of Stochastic Parrots: Differentially Private Prompt Learning for Large Language Models

May 24, 2023
Haonan Duan, Adam Dziedzic, Nicolas Papernot, Franziska Boenisch

Figure 1 for Flocks of Stochastic Parrots: Differentially Private Prompt Learning for Large Language Models
Figure 2 for Flocks of Stochastic Parrots: Differentially Private Prompt Learning for Large Language Models
Figure 3 for Flocks of Stochastic Parrots: Differentially Private Prompt Learning for Large Language Models
Figure 4 for Flocks of Stochastic Parrots: Differentially Private Prompt Learning for Large Language Models
Viaarxiv icon

Have it your way: Individualized Privacy Assignment for DP-SGD

Mar 29, 2023
Franziska Boenisch, Christopher Mühl, Adam Dziedzic, Roy Rinberg, Nicolas Papernot

Figure 1 for Have it your way: Individualized Privacy Assignment for DP-SGD
Figure 2 for Have it your way: Individualized Privacy Assignment for DP-SGD
Figure 3 for Have it your way: Individualized Privacy Assignment for DP-SGD
Figure 4 for Have it your way: Individualized Privacy Assignment for DP-SGD
Viaarxiv icon

Learning with Impartiality to Walk on the Pareto Frontier of Fairness, Privacy, and Utility

Feb 17, 2023
Mohammad Yaghini, Patty Liu, Franziska Boenisch, Nicolas Papernot

Figure 1 for Learning with Impartiality to Walk on the Pareto Frontier of Fairness, Privacy, and Utility
Figure 2 for Learning with Impartiality to Walk on the Pareto Frontier of Fairness, Privacy, and Utility
Figure 3 for Learning with Impartiality to Walk on the Pareto Frontier of Fairness, Privacy, and Utility
Figure 4 for Learning with Impartiality to Walk on the Pareto Frontier of Fairness, Privacy, and Utility
Viaarxiv icon

Is Federated Learning a Practical PET Yet?

Jan 09, 2023
Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot

Figure 1 for Is Federated Learning a Practical PET Yet?
Figure 2 for Is Federated Learning a Practical PET Yet?
Figure 3 for Is Federated Learning a Practical PET Yet?
Figure 4 for Is Federated Learning a Practical PET Yet?
Viaarxiv icon

Introducing Model Inversion Attacks on Automatic Speaker Recognition

Jan 09, 2023
Karla Pizzi, Franziska Boenisch, Ugur Sahin, Konstantin Böttinger

Figure 1 for Introducing Model Inversion Attacks on Automatic Speaker Recognition
Figure 2 for Introducing Model Inversion Attacks on Automatic Speaker Recognition
Figure 3 for Introducing Model Inversion Attacks on Automatic Speaker Recognition
Figure 4 for Introducing Model Inversion Attacks on Automatic Speaker Recognition
Viaarxiv icon