Picture for Shakila Mahjabin Tonni

Shakila Mahjabin Tonni

Suspiciousness of Adversarial Texts to Human

Add code
Oct 06, 2024
Figure 1 for Suspiciousness of Adversarial Texts to Human
Figure 2 for Suspiciousness of Adversarial Texts to Human
Figure 3 for Suspiciousness of Adversarial Texts to Human
Figure 4 for Suspiciousness of Adversarial Texts to Human
Viaarxiv icon

IDT: Dual-Task Adversarial Attacks for Privacy Protection

Add code
Jun 28, 2024
Figure 1 for IDT: Dual-Task Adversarial Attacks for Privacy Protection
Figure 2 for IDT: Dual-Task Adversarial Attacks for Privacy Protection
Figure 3 for IDT: Dual-Task Adversarial Attacks for Privacy Protection
Figure 4 for IDT: Dual-Task Adversarial Attacks for Privacy Protection
Viaarxiv icon

What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples

Add code
Sep 21, 2023
Figure 1 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Figure 2 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Figure 3 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Figure 4 for What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples
Viaarxiv icon

Data and Model Dependencies of Membership Inference Attack

Add code
Feb 17, 2020
Figure 1 for Data and Model Dependencies of Membership Inference Attack
Figure 2 for Data and Model Dependencies of Membership Inference Attack
Figure 3 for Data and Model Dependencies of Membership Inference Attack
Figure 4 for Data and Model Dependencies of Membership Inference Attack
Viaarxiv icon