Alert button
Picture for Vincent Bindschaedler

Vincent Bindschaedler

Alert button

DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning

Add code
Bookmark button
Alert button
Nov 02, 2023
Wenxuan Bao, Francesco Pittaluga, Vijay Kumar B G, Vincent Bindschaedler

Viaarxiv icon

SoK: Memorization in General-Purpose Large Language Models

Add code
Bookmark button
Alert button
Oct 24, 2023
Valentin Hartmann, Anshuman Suri, Vincent Bindschaedler, David Evans, Shruti Tople, Robert West

Figure 1 for SoK: Memorization in General-Purpose Large Language Models
Viaarxiv icon

On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning

Add code
Bookmark button
Alert button
May 13, 2022
Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler

Figure 1 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 2 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 3 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 4 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Viaarxiv icon

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems

Add code
Bookmark button
Alert button
Mar 10, 2022
Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor

Figure 1 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 2 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 3 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 4 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Viaarxiv icon

Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs

Add code
Bookmark button
Alert button
Oct 25, 2021
Hadi Abdullah, Muhammad Sajidur Rahman, Christian Peeters, Cassidy Gibson, Washington Garcia, Vincent Bindschaedler, Thomas Shrimpton, Patrick Traynor

Figure 1 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 2 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 3 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 4 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Viaarxiv icon

Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption

Add code
Bookmark button
Alert button
Oct 13, 2021
Luke A. Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler, Thomas Shrimpton

Figure 1 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 2 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 3 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 4 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Viaarxiv icon

SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems

Add code
Bookmark button
Alert button
Jul 21, 2020
Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor

Figure 1 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 2 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 3 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 4 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Viaarxiv icon

The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems

Add code
Bookmark button
Alert button
Jul 13, 2020
Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor

Figure 1 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 2 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 3 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 4 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Viaarxiv icon

Understanding Membership Inferences on Well-Generalized Learning Models

Add code
Bookmark button
Alert button
Feb 13, 2018
Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen

Figure 1 for Understanding Membership Inferences on Well-Generalized Learning Models
Figure 2 for Understanding Membership Inferences on Well-Generalized Learning Models
Figure 3 for Understanding Membership Inferences on Well-Generalized Learning Models
Figure 4 for Understanding Membership Inferences on Well-Generalized Learning Models
Viaarxiv icon