Alert button
Picture for Seng Pei Liew

Seng Pei Liew

Alert button

Scaling Private Deep Learning with Low-Rank and Sparse Gradients

Add code
Bookmark button
Alert button
Jul 06, 2022
Ryuichi Ito, Seng Pei Liew, Tsubasa Takahashi, Yuya Sasaki, Makoto Onizuka

Figure 1 for Scaling Private Deep Learning with Low-Rank and Sparse Gradients
Figure 2 for Scaling Private Deep Learning with Low-Rank and Sparse Gradients
Figure 3 for Scaling Private Deep Learning with Low-Rank and Sparse Gradients
Figure 4 for Scaling Private Deep Learning with Low-Rank and Sparse Gradients
Viaarxiv icon

Shuffle Gaussian Mechanism for Differential Privacy

Add code
Bookmark button
Alert button
Jul 04, 2022
Seng Pei Liew, Tsubasa Takahashi

Figure 1 for Shuffle Gaussian Mechanism for Differential Privacy
Figure 2 for Shuffle Gaussian Mechanism for Differential Privacy
Viaarxiv icon

Shuffled Check-in: Privacy Amplification towards Practical Distributed Learning

Add code
Bookmark button
Alert button
Jun 07, 2022
Seng Pei Liew, Satoshi Hasegawa, Tsubasa Takahashi

Figure 1 for Shuffled Check-in: Privacy Amplification towards Practical Distributed Learning
Figure 2 for Shuffled Check-in: Privacy Amplification towards Practical Distributed Learning
Figure 3 for Shuffled Check-in: Privacy Amplification towards Practical Distributed Learning
Figure 4 for Shuffled Check-in: Privacy Amplification towards Practical Distributed Learning
Viaarxiv icon

Network Shuffling: Privacy Amplification via Random Walks

Add code
Bookmark button
Alert button
Apr 08, 2022
Seng Pei Liew, Tsubasa Takahashi, Shun Takagi, Fumiyuki Kato, Yang Cao, Masatoshi Yoshikawa

Figure 1 for Network Shuffling: Privacy Amplification via Random Walks
Figure 2 for Network Shuffling: Privacy Amplification via Random Walks
Figure 3 for Network Shuffling: Privacy Amplification via Random Walks
Figure 4 for Network Shuffling: Privacy Amplification via Random Walks
Viaarxiv icon

Universal Adversarial Spoofing Attacks against Face Recognition

Add code
Bookmark button
Alert button
Oct 02, 2021
Takuma Amada, Seng Pei Liew, Kazuya Kakizaki, Toshinori Araki

Figure 1 for Universal Adversarial Spoofing Attacks against Face Recognition
Figure 2 for Universal Adversarial Spoofing Attacks against Face Recognition
Figure 3 for Universal Adversarial Spoofing Attacks against Face Recognition
Figure 4 for Universal Adversarial Spoofing Attacks against Face Recognition
Viaarxiv icon

PEARL: Data Synthesis via Private Embeddings and Adversarial Reconstruction Learning

Add code
Bookmark button
Alert button
Jun 08, 2021
Seng Pei Liew, Tsubasa Takahashi, Michihiko Ueno

Figure 1 for PEARL: Data Synthesis via Private Embeddings and Adversarial Reconstruction Learning
Figure 2 for PEARL: Data Synthesis via Private Embeddings and Adversarial Reconstruction Learning
Figure 3 for PEARL: Data Synthesis via Private Embeddings and Adversarial Reconstruction Learning
Figure 4 for PEARL: Data Synthesis via Private Embeddings and Adversarial Reconstruction Learning
Viaarxiv icon

Advanced Multi-Variate Analysis Methods for New Physics Searches at the Large Hadron Collider

Add code
Bookmark button
Alert button
May 16, 2021
Anna Stakia, Tommaso Dorigo, Giovanni Banelli, Daniela Bortoletto, Alessandro Casa, Pablo de Castro, Christophe Delaere, Julien Donini, Livio Finos, Michele Gallinaro, Andrea Giammanco, Alexander Held, Fabricio Jiménez Morales, Grzegorz Kotkowski, Seng Pei Liew, Fabio Maltoni, Giovanna Menardi, Ioanna Papavergou, Alessia Saggio, Bruno Scarpa, Giles C. Strong, Cecilia Tosciri, João Varela, Pietro Vischia, Andreas Weiler

Figure 1 for Advanced Multi-Variate Analysis Methods for New Physics Searches at the Large Hadron Collider
Figure 2 for Advanced Multi-Variate Analysis Methods for New Physics Searches at the Large Hadron Collider
Figure 3 for Advanced Multi-Variate Analysis Methods for New Physics Searches at the Large Hadron Collider
Figure 4 for Advanced Multi-Variate Analysis Methods for New Physics Searches at the Large Hadron Collider
Viaarxiv icon

FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries

Add code
Bookmark button
Alert button
Oct 27, 2020
Seng Pei Liew, Tsubasa Takahashi

Figure 1 for FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries
Figure 2 for FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries
Figure 3 for FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries
Figure 4 for FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries
Viaarxiv icon