Alert button
Picture for Varun Chandrasekaran

Varun Chandrasekaran

Alert button

Verifiable and Provably Secure Machine Unlearning

Add code
Bookmark button
Alert button
Oct 17, 2022
Thorsten Eisenhofer, Doreen Riepel, Varun Chandrasekaran, Esha Ghosh, Olga Ohrimenko, Nicolas Papernot

Figure 1 for Verifiable and Provably Secure Machine Unlearning
Figure 2 for Verifiable and Provably Secure Machine Unlearning
Figure 3 for Verifiable and Provably Secure Machine Unlearning
Figure 4 for Verifiable and Provably Secure Machine Unlearning
Viaarxiv icon

On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning

Add code
Bookmark button
Alert button
Aug 06, 2022
Congyu Fang, Hengrui Jia, Anvith Thudi, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Varun Chandrasekaran, Nicolas Papernot

Figure 1 for On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning
Figure 2 for On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning
Figure 3 for On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning
Figure 4 for On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning
Viaarxiv icon

Generative Extraction of Audio Classifiers for Speaker Identification

Add code
Bookmark button
Alert button
Jul 26, 2022
Tejumade Afonja, Lucas Bourtoule, Varun Chandrasekaran, Sageev Oore, Nicolas Papernot

Figure 1 for Generative Extraction of Audio Classifiers for Speaker Identification
Figure 2 for Generative Extraction of Audio Classifiers for Speaker Identification
Figure 3 for Generative Extraction of Audio Classifiers for Speaker Identification
Figure 4 for Generative Extraction of Audio Classifiers for Speaker Identification
Viaarxiv icon

Hierarchical Federated Learning with Privacy

Add code
Bookmark button
Alert button
Jun 10, 2022
Varun Chandrasekaran, Suman Banerjee, Diego Perino, Nicolas Kourtellis

Figure 1 for Hierarchical Federated Learning with Privacy
Figure 2 for Hierarchical Federated Learning with Privacy
Figure 3 for Hierarchical Federated Learning with Privacy
Figure 4 for Hierarchical Federated Learning with Privacy
Viaarxiv icon

CONFIDANT: A Privacy Controller for Social Robots

Add code
Bookmark button
Alert button
Jan 08, 2022
Brian Tang, Dakota Sullivan, Bengisu Cagiltay, Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu

Figure 1 for CONFIDANT: A Privacy Controller for Social Robots
Figure 2 for CONFIDANT: A Privacy Controller for Social Robots
Figure 3 for CONFIDANT: A Privacy Controller for Social Robots
Figure 4 for CONFIDANT: A Privacy Controller for Social Robots
Viaarxiv icon

Unrolling SGD: Understanding Factors Influencing Machine Unlearning

Add code
Bookmark button
Alert button
Sep 27, 2021
Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot

Figure 1 for Unrolling SGD: Understanding Factors Influencing Machine Unlearning
Figure 2 for Unrolling SGD: Understanding Factors Influencing Machine Unlearning
Figure 3 for Unrolling SGD: Understanding Factors Influencing Machine Unlearning
Figure 4 for Unrolling SGD: Understanding Factors Influencing Machine Unlearning
Viaarxiv icon

SoK: Machine Learning Governance

Add code
Bookmark button
Alert button
Sep 20, 2021
Varun Chandrasekaran, Hengrui Jia, Anvith Thudi, Adelin Travers, Mohammad Yaghini, Nicolas Papernot

Figure 1 for SoK: Machine Learning Governance
Viaarxiv icon

On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples

Add code
Bookmark button
Alert button
Aug 03, 2021
Adelin Travers, Lorna Licollari, Guanghan Wang, Varun Chandrasekaran, Adam Dziedzic, David Lie, Nicolas Papernot

Figure 1 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 2 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 3 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 4 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Viaarxiv icon

Causally Constrained Data Synthesis for Private Data Release

Add code
Bookmark button
Alert button
May 27, 2021
Varun Chandrasekaran, Darren Edge, Somesh Jha, Amit Sharma, Cheng Zhang, Shruti Tople

Figure 1 for Causally Constrained Data Synthesis for Private Data Release
Figure 2 for Causally Constrained Data Synthesis for Private Data Release
Figure 3 for Causally Constrained Data Synthesis for Private Data Release
Figure 4 for Causally Constrained Data Synthesis for Private Data Release
Viaarxiv icon

Proof-of-Learning: Definitions and Practice

Add code
Bookmark button
Alert button
Mar 09, 2021
Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot

Figure 1 for Proof-of-Learning: Definitions and Practice
Figure 2 for Proof-of-Learning: Definitions and Practice
Figure 3 for Proof-of-Learning: Definitions and Practice
Figure 4 for Proof-of-Learning: Definitions and Practice
Viaarxiv icon