Picture for Nicolas Papernot

Nicolas Papernot

Hyperparameter Tuning with Renyi Differential Privacy

Add code
Oct 07, 2021
Figure 1 for Hyperparameter Tuning with Renyi Differential Privacy
Figure 2 for Hyperparameter Tuning with Renyi Differential Privacy
Figure 3 for Hyperparameter Tuning with Renyi Differential Privacy
Figure 4 for Hyperparameter Tuning with Renyi Differential Privacy
Viaarxiv icon

Unrolling SGD: Understanding Factors Influencing Machine Unlearning

Add code
Sep 27, 2021
Figure 1 for Unrolling SGD: Understanding Factors Influencing Machine Unlearning
Figure 2 for Unrolling SGD: Understanding Factors Influencing Machine Unlearning
Figure 3 for Unrolling SGD: Understanding Factors Influencing Machine Unlearning
Figure 4 for Unrolling SGD: Understanding Factors Influencing Machine Unlearning
Viaarxiv icon

Interpretability in Safety-Critical FinancialTrading Systems

Add code
Sep 24, 2021
Figure 1 for Interpretability in Safety-Critical FinancialTrading Systems
Figure 2 for Interpretability in Safety-Critical FinancialTrading Systems
Figure 3 for Interpretability in Safety-Critical FinancialTrading Systems
Figure 4 for Interpretability in Safety-Critical FinancialTrading Systems
Viaarxiv icon

SoK: Machine Learning Governance

Add code
Sep 20, 2021
Figure 1 for SoK: Machine Learning Governance
Viaarxiv icon

On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples

Add code
Aug 03, 2021
Figure 1 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 2 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 3 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 4 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Viaarxiv icon

Bad Characters: Imperceptible NLP Attacks

Add code
Jun 18, 2021
Figure 1 for Bad Characters: Imperceptible NLP Attacks
Figure 2 for Bad Characters: Imperceptible NLP Attacks
Figure 3 for Bad Characters: Imperceptible NLP Attacks
Figure 4 for Bad Characters: Imperceptible NLP Attacks
Viaarxiv icon

Markpainting: Adversarial Machine Learning meets Inpainting

Add code
Jun 01, 2021
Figure 1 for Markpainting: Adversarial Machine Learning meets Inpainting
Figure 2 for Markpainting: Adversarial Machine Learning meets Inpainting
Figure 3 for Markpainting: Adversarial Machine Learning meets Inpainting
Figure 4 for Markpainting: Adversarial Machine Learning meets Inpainting
Viaarxiv icon

Dataset Inference: Ownership Resolution in Machine Learning

Add code
Apr 21, 2021
Figure 1 for Dataset Inference: Ownership Resolution in Machine Learning
Figure 2 for Dataset Inference: Ownership Resolution in Machine Learning
Figure 3 for Dataset Inference: Ownership Resolution in Machine Learning
Figure 4 for Dataset Inference: Ownership Resolution in Machine Learning
Viaarxiv icon

Manipulating SGD with Data Ordering Attacks

Add code
Apr 19, 2021
Figure 1 for Manipulating SGD with Data Ordering Attacks
Figure 2 for Manipulating SGD with Data Ordering Attacks
Figure 3 for Manipulating SGD with Data Ordering Attacks
Figure 4 for Manipulating SGD with Data Ordering Attacks
Viaarxiv icon

Proof-of-Learning: Definitions and Practice

Add code
Mar 09, 2021
Figure 1 for Proof-of-Learning: Definitions and Practice
Figure 2 for Proof-of-Learning: Definitions and Practice
Figure 3 for Proof-of-Learning: Definitions and Practice
Figure 4 for Proof-of-Learning: Definitions and Practice
Viaarxiv icon