Picture for Prateek Mittal

Prateek Mittal

A Randomized Approach for Tight Privacy Accounting

Add code
Apr 17, 2023
Figure 1 for A Randomized Approach for Tight Privacy Accounting
Figure 2 for A Randomized Approach for Tight Privacy Accounting
Figure 3 for A Randomized Approach for Tight Privacy Accounting
Figure 4 for A Randomized Approach for Tight Privacy Accounting
Viaarxiv icon

Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker

Add code
Feb 21, 2023
Figure 1 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Figure 2 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Figure 3 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Figure 4 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Viaarxiv icon

MultiRobustBench: Benchmarking Robustness Against Multiple Attacks

Add code
Feb 21, 2023
Figure 1 for MultiRobustBench: Benchmarking Robustness Against Multiple Attacks
Figure 2 for MultiRobustBench: Benchmarking Robustness Against Multiple Attacks
Figure 3 for MultiRobustBench: Benchmarking Robustness Against Multiple Attacks
Figure 4 for MultiRobustBench: Benchmarking Robustness Against Multiple Attacks
Viaarxiv icon

Uncovering Adversarial Risks of Test-Time Adaptation

Add code
Feb 04, 2023
Figure 1 for Uncovering Adversarial Risks of Test-Time Adaptation
Figure 2 for Uncovering Adversarial Risks of Test-Time Adaptation
Figure 3 for Uncovering Adversarial Risks of Test-Time Adaptation
Figure 4 for Uncovering Adversarial Risks of Test-Time Adaptation
Viaarxiv icon

Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning

Add code
Feb 03, 2023
Figure 1 for Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
Figure 2 for Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
Figure 3 for Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
Figure 4 for Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
Viaarxiv icon

DP-RAFT: A Differentially Private Recipe for Accelerated Fine-Tuning

Add code
Dec 15, 2022
Viaarxiv icon

Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning

Add code
Sep 16, 2022
Figure 1 for Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning
Figure 2 for Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning
Figure 3 for Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning
Figure 4 for Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning
Viaarxiv icon

A Light Recipe to Train Robust Vision Transformers

Add code
Sep 15, 2022
Figure 1 for A Light Recipe to Train Robust Vision Transformers
Figure 2 for A Light Recipe to Train Robust Vision Transformers
Figure 3 for A Light Recipe to Train Robust Vision Transformers
Figure 4 for A Light Recipe to Train Robust Vision Transformers
Viaarxiv icon

Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation

Add code
Jul 22, 2022
Figure 1 for Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Figure 2 for Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Figure 3 for Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Figure 4 for Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Viaarxiv icon

Understanding Robust Learning through the Lens of Representation Similarities

Add code
Jun 20, 2022
Figure 1 for Understanding Robust Learning through the Lens of Representation Similarities
Figure 2 for Understanding Robust Learning through the Lens of Representation Similarities
Figure 3 for Understanding Robust Learning through the Lens of Representation Similarities
Figure 4 for Understanding Robust Learning through the Lens of Representation Similarities
Viaarxiv icon