Picture for Shruti Tople

Shruti Tople

Microsoft Research

Analyzing Leakage of Personally Identifiable Information in Language Models

Add code
Feb 01, 2023
Figure 1 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 2 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 3 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 4 for Analyzing Leakage of Personally Identifiable Information in Language Models
Viaarxiv icon

SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning

Add code
Dec 21, 2022
Figure 1 for SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Figure 2 for SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Figure 3 for SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Viaarxiv icon

Invariant Aggregator for Defending Federated Backdoor Attacks

Add code
Oct 04, 2022
Figure 1 for Invariant Aggregator for Defending Federated Backdoor Attacks
Figure 2 for Invariant Aggregator for Defending Federated Backdoor Attacks
Figure 3 for Invariant Aggregator for Defending Federated Backdoor Attacks
Figure 4 for Invariant Aggregator for Defending Federated Backdoor Attacks
Viaarxiv icon

Membership Inference Attacks and Generalization: A Causal Perspective

Add code
Sep 18, 2022
Figure 1 for Membership Inference Attacks and Generalization: A Causal Perspective
Figure 2 for Membership Inference Attacks and Generalization: A Causal Perspective
Figure 3 for Membership Inference Attacks and Generalization: A Causal Perspective
Figure 4 for Membership Inference Attacks and Generalization: A Causal Perspective
Viaarxiv icon

Distribution inference risks: Identifying and mitigating sources of leakage

Add code
Sep 18, 2022
Figure 1 for Distribution inference risks: Identifying and mitigating sources of leakage
Figure 2 for Distribution inference risks: Identifying and mitigating sources of leakage
Figure 3 for Distribution inference risks: Identifying and mitigating sources of leakage
Figure 4 for Distribution inference risks: Identifying and mitigating sources of leakage
Viaarxiv icon

Bayesian Estimation of Differential Privacy

Add code
Jun 15, 2022
Figure 1 for Bayesian Estimation of Differential Privacy
Figure 2 for Bayesian Estimation of Differential Privacy
Figure 3 for Bayesian Estimation of Differential Privacy
Figure 4 for Bayesian Estimation of Differential Privacy
Viaarxiv icon

The Connection between Out-of-Distribution Generalization and Privacy of ML Models

Add code
Oct 07, 2021
Figure 1 for The Connection between Out-of-Distribution Generalization and Privacy of ML Models
Figure 2 for The Connection between Out-of-Distribution Generalization and Privacy of ML Models
Figure 3 for The Connection between Out-of-Distribution Generalization and Privacy of ML Models
Figure 4 for The Connection between Out-of-Distribution Generalization and Privacy of ML Models
Viaarxiv icon

Causally Constrained Data Synthesis for Private Data Release

Add code
May 27, 2021
Figure 1 for Causally Constrained Data Synthesis for Private Data Release
Figure 2 for Causally Constrained Data Synthesis for Private Data Release
Figure 3 for Causally Constrained Data Synthesis for Private Data Release
Figure 4 for Causally Constrained Data Synthesis for Private Data Release
Viaarxiv icon

SOTERIA: In Search of Efficient Neural Networks for Private Inference

Add code
Jul 25, 2020
Figure 1 for SOTERIA: In Search of Efficient Neural Networks for Private Inference
Figure 2 for SOTERIA: In Search of Efficient Neural Networks for Private Inference
Figure 3 for SOTERIA: In Search of Efficient Neural Networks for Private Inference
Figure 4 for SOTERIA: In Search of Efficient Neural Networks for Private Inference
Viaarxiv icon

Replication-Robust Payoff-Allocation with Applications in Machine Learning Marketplaces

Add code
Jun 25, 2020
Figure 1 for Replication-Robust Payoff-Allocation with Applications in Machine Learning Marketplaces
Figure 2 for Replication-Robust Payoff-Allocation with Applications in Machine Learning Marketplaces
Figure 3 for Replication-Robust Payoff-Allocation with Applications in Machine Learning Marketplaces
Figure 4 for Replication-Robust Payoff-Allocation with Applications in Machine Learning Marketplaces
Viaarxiv icon