Alert button
Picture for Vasisht Duddu

Vasisht Duddu

Alert button

SoK: Unintended Interactions among Machine Learning Defenses and Risks

Add code
Bookmark button
Alert button
Dec 07, 2023
Vasisht Duddu, Sebastian Szyller, N. Asokan

Viaarxiv icon

Attesting Distributional Properties of Training Data for Machine Learning

Add code
Bookmark button
Alert button
Aug 18, 2023
Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan

Viaarxiv icon

GrOVe: Ownership Verification of Graph Neural Networks using Embeddings

Add code
Bookmark button
Alert button
Apr 17, 2023
Asim Waheed, Vasisht Duddu, N. Asokan

Figure 1 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Figure 2 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Figure 3 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Figure 4 for GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Viaarxiv icon

Leveraging Algorithmic Fairness to Mitigate Blackbox Attribute Inference Attacks

Add code
Bookmark button
Alert button
Nov 18, 2022
Jan Aalmoes, Vasisht Duddu, Antoine Boutet

Figure 1 for Leveraging Algorithmic Fairness to Mitigate Blackbox Attribute Inference Attacks
Figure 2 for Leveraging Algorithmic Fairness to Mitigate Blackbox Attribute Inference Attacks
Figure 3 for Leveraging Algorithmic Fairness to Mitigate Blackbox Attribute Inference Attacks
Figure 4 for Leveraging Algorithmic Fairness to Mitigate Blackbox Attribute Inference Attacks
Viaarxiv icon

Inferring Sensitive Attributes from Model Explanations

Add code
Bookmark button
Alert button
Aug 21, 2022
Vasisht Duddu, Antoine Boutet

Figure 1 for Inferring Sensitive Attributes from Model Explanations
Figure 2 for Inferring Sensitive Attributes from Model Explanations
Figure 3 for Inferring Sensitive Attributes from Model Explanations
Figure 4 for Inferring Sensitive Attributes from Model Explanations
Viaarxiv icon

Dikaios: Privacy Auditing of Algorithmic Fairness via Attribute Inference Attacks

Add code
Bookmark button
Alert button
Feb 04, 2022
Jan Aalmoes, Vasisht Duddu, Antoine Boutet

Figure 1 for Dikaios: Privacy Auditing of Algorithmic Fairness via Attribute Inference Attacks
Figure 2 for Dikaios: Privacy Auditing of Algorithmic Fairness via Attribute Inference Attacks
Figure 3 for Dikaios: Privacy Auditing of Algorithmic Fairness via Attribute Inference Attacks
Figure 4 for Dikaios: Privacy Auditing of Algorithmic Fairness via Attribute Inference Attacks
Viaarxiv icon

SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning

Add code
Bookmark button
Alert button
Dec 04, 2021
Vasisht Duddu, Sebastian Szyller, N. Asokan

Figure 1 for SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Figure 2 for SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Figure 3 for SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Figure 4 for SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Viaarxiv icon

Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks

Add code
Bookmark button
Alert button
Apr 26, 2021
Sebastian Szyller, Vasisht Duddu, Tommi Gröndahl, N. Asokan

Figure 1 for Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks
Figure 2 for Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks
Figure 3 for Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks
Figure 4 for Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks
Viaarxiv icon

GECKO: Reconciling Privacy, Accuracy and Efficiency in Embedded Deep Learning

Add code
Bookmark button
Alert button
Oct 02, 2020
Vasisht Duddu, Antoine Boutet, Virat Shejwalkar

Figure 1 for GECKO: Reconciling Privacy, Accuracy and Efficiency in Embedded Deep Learning
Figure 2 for GECKO: Reconciling Privacy, Accuracy and Efficiency in Embedded Deep Learning
Figure 3 for GECKO: Reconciling Privacy, Accuracy and Efficiency in Embedded Deep Learning
Figure 4 for GECKO: Reconciling Privacy, Accuracy and Efficiency in Embedded Deep Learning
Viaarxiv icon

Quantifying (Hyper) Parameter Leakage in Machine Learning

Add code
Bookmark button
Alert button
Oct 31, 2019
Vasisht Duddu, D. Vijay Rao

Figure 1 for Quantifying (Hyper) Parameter Leakage in Machine Learning
Figure 2 for Quantifying (Hyper) Parameter Leakage in Machine Learning
Figure 3 for Quantifying (Hyper) Parameter Leakage in Machine Learning
Figure 4 for Quantifying (Hyper) Parameter Leakage in Machine Learning
Viaarxiv icon