Alert button
Picture for Sanjay Kariyappa

Sanjay Kariyappa

Alert button

Privacy-Preserving Algorithmic Recourse

Add code
Bookmark button
Alert button
Nov 23, 2023
Sikha Pentyala, Shubham Sharma, Sanjay Kariyappa, Freddy Lecue, Daniele Magazzeni

Viaarxiv icon

SHAP@k:Efficient and Probably Approximately Correct (PAC) Identification of Top-k Features

Add code
Bookmark button
Alert button
Jul 10, 2023
Sanjay Kariyappa, Leonidas Tsepenekas, Freddy Lécué, Daniele Magazzeni

Figure 1 for SHAP@k:Efficient and Probably Approximately Correct (PAC) Identification of Top-k Features
Figure 2 for SHAP@k:Efficient and Probably Approximately Correct (PAC) Identification of Top-k Features
Figure 3 for SHAP@k:Efficient and Probably Approximately Correct (PAC) Identification of Top-k Features
Figure 4 for SHAP@k:Efficient and Probably Approximately Correct (PAC) Identification of Top-k Features
Viaarxiv icon

Information Flow Control in Machine Learning through Modular Model Architecture

Add code
Bookmark button
Alert button
Jun 05, 2023
Trishita Tiwari, Suchin Gururangan, Chuan Guo, Weizhe Hua, Sanjay Kariyappa, Udit Gupta, Wenjie Xiong, Kiwan Maeng, Hsien-Hsin S. Lee, G. Edward Suh

Figure 1 for Information Flow Control in Machine Learning through Modular Model Architecture
Figure 2 for Information Flow Control in Machine Learning through Modular Model Architecture
Figure 3 for Information Flow Control in Machine Learning through Modular Model Architecture
Figure 4 for Information Flow Control in Machine Learning through Modular Model Architecture
Viaarxiv icon

Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information

Add code
Bookmark button
Alert button
May 06, 2023
Kiwan Maeng, Chuan Guo, Sanjay Kariyappa, G. Edward Suh

Figure 1 for Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information
Figure 2 for Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information
Figure 3 for Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information
Figure 4 for Bounding the Invertibility of Privacy-preserving Instance Encoding using Fisher Information
Viaarxiv icon

Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information

Add code
Bookmark button
Alert button
Sep 21, 2022
Kiwan Maeng, Chuan Guo, Sanjay Kariyappa, Edward Suh

Figure 1 for Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information
Figure 2 for Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information
Figure 3 for Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information
Figure 4 for Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information
Viaarxiv icon

Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis

Add code
Bookmark button
Alert button
Sep 12, 2022
Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee

Figure 1 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 2 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 3 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 4 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Viaarxiv icon

Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning

Add code
Bookmark button
Alert button
Nov 25, 2021
Sanjay Kariyappa, Moinuddin K Qureshi

Figure 1 for Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning
Figure 2 for Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning
Figure 3 for Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning
Figure 4 for Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning
Viaarxiv icon

Enabling Inference Privacy with Adaptive Noise Injection

Add code
Bookmark button
Alert button
Apr 06, 2021
Sanjay Kariyappa, Ousmane Dia, Moinuddin K Qureshi

Figure 1 for Enabling Inference Privacy with Adaptive Noise Injection
Figure 2 for Enabling Inference Privacy with Adaptive Noise Injection
Figure 3 for Enabling Inference Privacy with Adaptive Noise Injection
Figure 4 for Enabling Inference Privacy with Adaptive Noise Injection
Viaarxiv icon

MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation

Add code
Bookmark button
Alert button
May 06, 2020
Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi

Figure 1 for MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation
Figure 2 for MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation
Figure 3 for MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation
Figure 4 for MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation
Viaarxiv icon

Defending Against Model Stealing Attacks with Adaptive Misinformation

Add code
Bookmark button
Alert button
Nov 16, 2019
Sanjay Kariyappa, Moinuddin K Qureshi

Figure 1 for Defending Against Model Stealing Attacks with Adaptive Misinformation
Figure 2 for Defending Against Model Stealing Attacks with Adaptive Misinformation
Figure 3 for Defending Against Model Stealing Attacks with Adaptive Misinformation
Figure 4 for Defending Against Model Stealing Attacks with Adaptive Misinformation
Viaarxiv icon