Picture for Mark Dras

Mark Dras

Microsoft Research Institute, Macquarie University

IDT: Dual-Task Adversarial Attacks for Privacy Protection

Add code
Jun 28, 2024
Viaarxiv icon

Bayes' capacity as a measure for reconstruction attacks in federated learning

Add code
Jun 19, 2024
Figure 1 for Bayes' capacity as a measure for reconstruction attacks in federated learning
Figure 2 for Bayes' capacity as a measure for reconstruction attacks in federated learning
Viaarxiv icon

Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients

Add code
Jun 03, 2024
Viaarxiv icon

Here's a Free Lunch: Sanitizing Backdoored Models with Model Merge

Add code
Feb 29, 2024
Viaarxiv icon

What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples

Add code
Sep 21, 2023
Figure 1 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Figure 2 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Figure 3 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Figure 4 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Viaarxiv icon

OptIForest: Optimal Isolation Forest for Anomaly Detection

Add code
Jun 23, 2023
Figure 1 for OptIForest: Optimal Isolation Forest for Anomaly Detection
Figure 2 for OptIForest: Optimal Isolation Forest for Anomaly Detection
Figure 3 for OptIForest: Optimal Isolation Forest for Anomaly Detection
Figure 4 for OptIForest: Optimal Isolation Forest for Anomaly Detection
Viaarxiv icon

Directional Privacy for Deep Learning

Add code
Nov 09, 2022
Figure 1 for Directional Privacy for Deep Learning
Figure 2 for Directional Privacy for Deep Learning
Figure 3 for Directional Privacy for Deep Learning
Figure 4 for Directional Privacy for Deep Learning
Viaarxiv icon

Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations

Add code
Apr 29, 2022
Figure 1 for Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Figure 2 for Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Figure 3 for Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Figure 4 for Detecting Textual Adversarial Examples Based on Distributional Characteristics of Data Representations
Viaarxiv icon

Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis

Add code
Mar 18, 2022
Figure 1 for Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis
Figure 2 for Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis
Figure 3 for Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis
Figure 4 for Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis
Viaarxiv icon

Neural Rule-Execution Tracking Machine For Transformer-Based Text Generation

Add code
Jul 27, 2021
Figure 1 for Neural Rule-Execution Tracking Machine For Transformer-Based Text Generation
Figure 2 for Neural Rule-Execution Tracking Machine For Transformer-Based Text Generation
Figure 3 for Neural Rule-Execution Tracking Machine For Transformer-Based Text Generation
Figure 4 for Neural Rule-Execution Tracking Machine For Transformer-Based Text Generation
Viaarxiv icon