Alert button
Picture for N. Asokan

N. Asokan

Alert button

SoK: Unintended Interactions among Machine Learning Defenses and Risks

Add code
Bookmark button
Alert button
Dec 07, 2023
Vasisht Duddu, Sebastian Szyller, N. Asokan

Viaarxiv icon

Attesting Distributional Properties of Training Data for Machine Learning

Add code
Bookmark button
Alert button
Aug 18, 2023
Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan

Viaarxiv icon

FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks

Add code
Bookmark button
Alert button
Jul 27, 2023
Buse G. A. Tekgul, N. Asokan

Viaarxiv icon

False Claims against Model Ownership Resolution

Add code
Bookmark button
Alert button
Apr 28, 2023
Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan

Figure 1 for False Claims against Model Ownership Resolution
Figure 2 for False Claims against Model Ownership Resolution
Figure 3 for False Claims against Model Ownership Resolution
Figure 4 for False Claims against Model Ownership Resolution
Viaarxiv icon

GrOVe: Ownership Verification of Graph Neural Networks using Embeddings

Add code
Bookmark button
Alert button
Apr 17, 2023
Asim Waheed, Vasisht Duddu, N. Asokan

Figure 1 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Figure 2 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Figure 3 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Figure 4 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Viaarxiv icon

On the Robustness of Dataset Inference

Add code
Bookmark button
Alert button
Oct 24, 2022
Sebastian Szyller, Rui Zhang, Jian Liu, N. Asokan

Figure 1 for On the Robustness of Dataset Inference
Figure 2 for On the Robustness of Dataset Inference
Figure 3 for On the Robustness of Dataset Inference
Figure 4 for On the Robustness of Dataset Inference
Viaarxiv icon

Conflicting Interactions Among Protections Mechanisms for Machine Learning Models

Add code
Bookmark button
Alert button
Jul 05, 2022
Sebastian Szyller, N. Asokan

Figure 1 for Conflicting Interactions Among Protections Mechanisms for Machine Learning Models
Figure 2 for Conflicting Interactions Among Protections Mechanisms for Machine Learning Models
Figure 3 for Conflicting Interactions Among Protections Mechanisms for Machine Learning Models
Figure 4 for Conflicting Interactions Among Protections Mechanisms for Machine Learning Models
Viaarxiv icon

On the Effectiveness of Dataset Watermarking in Adversarial Settings

Add code
Bookmark button
Alert button
Feb 25, 2022
Buse Gul Atli Tekgul, N. Asokan

Figure 1 for On the Effectiveness of Dataset Watermarking in Adversarial Settings
Figure 2 for On the Effectiveness of Dataset Watermarking in Adversarial Settings
Figure 3 for On the Effectiveness of Dataset Watermarking in Adversarial Settings
Figure 4 for On the Effectiveness of Dataset Watermarking in Adversarial Settings
Viaarxiv icon

Do Transformers use variable binding?

Add code
Bookmark button
Alert button
Feb 19, 2022
Tommi Gröndahl, N. Asokan

Figure 1 for Do Transformers use variable binding?
Figure 2 for Do Transformers use variable binding?
Figure 3 for Do Transformers use variable binding?
Figure 4 for Do Transformers use variable binding?
Viaarxiv icon