Alert button
Picture for Luke A. Bauer

Luke A. Bauer

Alert button

On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning

Add code
Bookmark button
Alert button
May 13, 2022
Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler

Figure 1 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 2 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 3 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 4 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Viaarxiv icon

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems

Add code
Bookmark button
Alert button
Mar 10, 2022
Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor

Figure 1 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 2 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 3 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 4 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Viaarxiv icon

Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption

Add code
Bookmark button
Alert button
Oct 13, 2021
Luke A. Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler, Thomas Shrimpton

Figure 1 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 2 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 3 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 4 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Viaarxiv icon