Picture for Mario Fritz

Mario Fritz

Conditional Flow Variational Autoencoders for Structured Sequence Prediction

Add code
Aug 24, 2019
Figure 1 for Conditional Flow Variational Autoencoders for Structured Sequence Prediction
Figure 2 for Conditional Flow Variational Autoencoders for Structured Sequence Prediction
Figure 3 for Conditional Flow Variational Autoencoders for Structured Sequence Prediction
Figure 4 for Conditional Flow Variational Autoencoders for Structured Sequence Prediction
Viaarxiv icon

Interpretability Beyond Classification Output: Semantic Bottleneck Networks

Add code
Jul 28, 2019
Figure 1 for Interpretability Beyond Classification Output: Semantic Bottleneck Networks
Figure 2 for Interpretability Beyond Classification Output: Semantic Bottleneck Networks
Figure 3 for Interpretability Beyond Classification Output: Semantic Bottleneck Networks
Figure 4 for Interpretability Beyond Classification Output: Semantic Bottleneck Networks
Viaarxiv icon

Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks

Add code
Jun 26, 2019
Figure 1 for Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks
Figure 2 for Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks
Figure 3 for Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks
Figure 4 for Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks
Viaarxiv icon

SampleFix: Learning to Correct Programs by Sampling Diverse Fixes

Add code
Jun 24, 2019
Figure 1 for SampleFix: Learning to Correct Programs by Sampling Diverse Fixes
Figure 2 for SampleFix: Learning to Correct Programs by Sampling Diverse Fixes
Figure 3 for SampleFix: Learning to Correct Programs by Sampling Diverse Fixes
Figure 4 for SampleFix: Learning to Correct Programs by Sampling Diverse Fixes
Viaarxiv icon

Shape Evasion: Preventing Body Shape Inference of Multi-Stage Approaches

Add code
May 27, 2019
Figure 1 for Shape Evasion: Preventing Body Shape Inference of Multi-Stage Approaches
Figure 2 for Shape Evasion: Preventing Body Shape Inference of Multi-Stage Approaches
Figure 3 for Shape Evasion: Preventing Body Shape Inference of Multi-Stage Approaches
Figure 4 for Shape Evasion: Preventing Body Shape Inference of Multi-Stage Approaches
Viaarxiv icon

Learning Manipulation under Physics Constraints with Visual Perception

Add code
Apr 19, 2019
Figure 1 for Learning Manipulation under Physics Constraints with Visual Perception
Figure 2 for Learning Manipulation under Physics Constraints with Visual Perception
Figure 3 for Learning Manipulation under Physics Constraints with Visual Perception
Figure 4 for Learning Manipulation under Physics Constraints with Visual Perception
Viaarxiv icon

Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning

Add code
Apr 01, 2019
Figure 1 for Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
Viaarxiv icon

Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation

Add code
Dec 17, 2018
Figure 1 for Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation
Figure 2 for Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation
Figure 3 for Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation
Figure 4 for Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation
Viaarxiv icon

Knockoff Nets: Stealing Functionality of Black-Box Models

Add code
Dec 06, 2018
Figure 1 for Knockoff Nets: Stealing Functionality of Black-Box Models
Figure 2 for Knockoff Nets: Stealing Functionality of Black-Box Models
Figure 3 for Knockoff Nets: Stealing Functionality of Black-Box Models
Figure 4 for Knockoff Nets: Stealing Functionality of Black-Box Models
Viaarxiv icon

Attributing Fake Images to GANs: Analyzing Fingerprints in Generated Images

Add code
Nov 20, 2018
Figure 1 for Attributing Fake Images to GANs: Analyzing Fingerprints in Generated Images
Figure 2 for Attributing Fake Images to GANs: Analyzing Fingerprints in Generated Images
Figure 3 for Attributing Fake Images to GANs: Analyzing Fingerprints in Generated Images
Figure 4 for Attributing Fake Images to GANs: Analyzing Fingerprints in Generated Images
Viaarxiv icon