Alert button
Picture for Shruti Tople

Shruti Tople

Alert button

Closed-Form Bounds for DP-SGD against Record-level Inference

Add code
Bookmark button
Alert button
Feb 22, 2024
Giovanni Cherubin, Boris Köpf, Andrew Paverd, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin

Viaarxiv icon

Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective

Add code
Bookmark button
Alert button
Nov 27, 2023
Lukas Wutschitz, Boris Köpf, Andrew Paverd, Saravan Rajmohan, Ahmed Salem, Shruti Tople, Santiago Zanella-Béguelin, Menglin Xia, Victor Rühle

Viaarxiv icon

SoK: Memorization in General-Purpose Large Language Models

Add code
Bookmark button
Alert button
Oct 24, 2023
Valentin Hartmann, Anshuman Suri, Vincent Bindschaedler, David Evans, Shruti Tople, Robert West

Figure 1 for SoK: Memorization in General-Purpose Large Language Models
Viaarxiv icon

Why Train More? Effective and Efficient Membership Inference via Memorization

Add code
Bookmark button
Alert button
Oct 12, 2023
Jihye Choi, Shruti Tople, Varun Chandrasekaran, Somesh Jha

Figure 1 for Why Train More? Effective and Efficient Membership Inference via Memorization
Figure 2 for Why Train More? Effective and Efficient Membership Inference via Memorization
Figure 3 for Why Train More? Effective and Efficient Membership Inference via Memorization
Figure 4 for Why Train More? Effective and Efficient Membership Inference via Memorization
Viaarxiv icon

Re-aligning Shadow Models can Improve White-box Membership Inference Attacks

Add code
Bookmark button
Alert button
Jun 08, 2023
Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople

Figure 1 for Re-aligning Shadow Models can Improve White-box Membership Inference Attacks
Figure 2 for Re-aligning Shadow Models can Improve White-box Membership Inference Attacks
Figure 3 for Re-aligning Shadow Models can Improve White-box Membership Inference Attacks
Figure 4 for Re-aligning Shadow Models can Improve White-box Membership Inference Attacks
Viaarxiv icon

On the Efficacy of Differentially Private Few-shot Image Classification

Add code
Bookmark button
Alert button
Feb 02, 2023
Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela

Figure 1 for On the Efficacy of Differentially Private Few-shot Image Classification
Figure 2 for On the Efficacy of Differentially Private Few-shot Image Classification
Figure 3 for On the Efficacy of Differentially Private Few-shot Image Classification
Figure 4 for On the Efficacy of Differentially Private Few-shot Image Classification
Viaarxiv icon

Analyzing Leakage of Personally Identifiable Information in Language Models

Add code
Bookmark button
Alert button
Feb 01, 2023
Nils Lukas, Ahmed Salem, Robert Sim, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin

Figure 1 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 2 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 3 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 4 for Analyzing Leakage of Personally Identifiable Information in Language Models
Viaarxiv icon

SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning

Add code
Bookmark button
Alert button
Dec 21, 2022
Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin

Figure 1 for SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Figure 2 for SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Figure 3 for SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
Viaarxiv icon

Invariant Aggregator for Defending Federated Backdoor Attacks

Add code
Bookmark button
Alert button
Oct 04, 2022
Xiaoyang Wang, Dimitrios Dimitriadis, Sanmi Koyejo, Shruti Tople

Figure 1 for Invariant Aggregator for Defending Federated Backdoor Attacks
Figure 2 for Invariant Aggregator for Defending Federated Backdoor Attacks
Figure 3 for Invariant Aggregator for Defending Federated Backdoor Attacks
Figure 4 for Invariant Aggregator for Defending Federated Backdoor Attacks
Viaarxiv icon

Membership Inference Attacks and Generalization: A Causal Perspective

Add code
Bookmark button
Alert button
Sep 18, 2022
Teodora Baluta, Shiqi Shen, S. Hitarth, Shruti Tople, Prateek Saxena

Figure 1 for Membership Inference Attacks and Generalization: A Causal Perspective
Figure 2 for Membership Inference Attacks and Generalization: A Causal Perspective
Figure 3 for Membership Inference Attacks and Generalization: A Causal Perspective
Figure 4 for Membership Inference Attacks and Generalization: A Causal Perspective
Viaarxiv icon