Alert button
Picture for Somesh Jha

Somesh Jha

Alert button

Exploring Adversarial Robustness of Deep Metric Learning

Add code
Bookmark button
Alert button
Feb 14, 2021
Thomas Kobber Panum, Zi Wang, Pengyu Kan, Earlence Fernandes, Somesh Jha

Figure 1 for Exploring Adversarial Robustness of Deep Metric Learning
Figure 2 for Exploring Adversarial Robustness of Deep Metric Learning
Figure 3 for Exploring Adversarial Robustness of Deep Metric Learning
Figure 4 for Exploring Adversarial Robustness of Deep Metric Learning
Viaarxiv icon

CaPC Learning: Confidential and Private Collaborative Learning

Add code
Bookmark button
Alert button
Feb 09, 2021
Christopher A. Choquette-Choo, Natalie Dullerud, Adam Dziedzic, Yunxiang Zhang, Somesh Jha, Nicolas Papernot, Xiao Wang

Figure 1 for CaPC Learning: Confidential and Private Collaborative Learning
Figure 2 for CaPC Learning: Confidential and Private Collaborative Learning
Figure 3 for CaPC Learning: Confidential and Private Collaborative Learning
Figure 4 for CaPC Learning: Confidential and Private Collaborative Learning
Viaarxiv icon

Sample Complexity of Adversarially Robust Linear Classification on Separated Data

Add code
Bookmark button
Alert button
Dec 19, 2020
Robi Bhattacharjee, Somesh Jha, Kamalika Chaudhuri

Figure 1 for Sample Complexity of Adversarially Robust Linear Classification on Separated Data
Figure 2 for Sample Complexity of Adversarially Robust Linear Classification on Separated Data
Viaarxiv icon

ShadowNet: A Secure and Efficient System for On-device Model Inference

Add code
Bookmark button
Alert button
Nov 11, 2020
Zhichuang Sun, Ruimin Sun, Long Lu, Somesh Jha

Figure 1 for ShadowNet: A Secure and Efficient System for On-device Model Inference
Figure 2 for ShadowNet: A Secure and Efficient System for On-device Model Inference
Figure 3 for ShadowNet: A Secure and Efficient System for On-device Model Inference
Figure 4 for ShadowNet: A Secure and Efficient System for On-device Model Inference
Viaarxiv icon

An Attack on InstaHide: Is Private Learning Possible with Instance Encoding?

Add code
Bookmark button
Alert button
Nov 10, 2020
Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Shuang Song, Abhradeep Thakurta, Florian Tramer

Figure 1 for An Attack on InstaHide: Is Private Learning Possible with Instance Encoding?
Figure 2 for An Attack on InstaHide: Is Private Learning Possible with Instance Encoding?
Figure 3 for An Attack on InstaHide: Is Private Learning Possible with Instance Encoding?
Figure 4 for An Attack on InstaHide: Is Private Learning Possible with Instance Encoding?
Viaarxiv icon

Detecting Anomalous Inputs to DNN Classifiers By Joint Statistical Testing at the Layers

Add code
Bookmark button
Alert button
Jul 29, 2020
Jayaram Raghuram, Varun Chandrasekaran, Somesh Jha, Suman Banerjee

Figure 1 for Detecting Anomalous Inputs to DNN Classifiers By Joint Statistical Testing at the Layers
Figure 2 for Detecting Anomalous Inputs to DNN Classifiers By Joint Statistical Testing at the Layers
Figure 3 for Detecting Anomalous Inputs to DNN Classifiers By Joint Statistical Testing at the Layers
Figure 4 for Detecting Anomalous Inputs to DNN Classifiers By Joint Statistical Testing at the Layers
Viaarxiv icon

Abstract Universal Approximation for Neural Networks

Add code
Bookmark button
Alert button
Jul 14, 2020
Zi Wang, Aws Albarghouthi, Somesh Jha

Figure 1 for Abstract Universal Approximation for Neural Networks
Figure 2 for Abstract Universal Approximation for Neural Networks
Figure 3 for Abstract Universal Approximation for Neural Networks
Figure 4 for Abstract Universal Approximation for Neural Networks
Viaarxiv icon

Robust Learning against Logical Adversaries

Add code
Bookmark button
Alert button
Jul 01, 2020
Yizhen Wang, Xiaozhu Meng, Mihai Christodorescu, Somesh Jha

Figure 1 for Robust Learning against Logical Adversaries
Figure 2 for Robust Learning against Logical Adversaries
Figure 3 for Robust Learning against Logical Adversaries
Viaarxiv icon

Robust Out-of-distribution Detection via Informative Outlier Mining

Add code
Bookmark button
Alert button
Jun 26, 2020
Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha

Figure 1 for Robust Out-of-distribution Detection via Informative Outlier Mining
Figure 2 for Robust Out-of-distribution Detection via Informative Outlier Mining
Figure 3 for Robust Out-of-distribution Detection via Informative Outlier Mining
Figure 4 for Robust Out-of-distribution Detection via Informative Outlier Mining
Viaarxiv icon