Alert button
Picture for Wojtek Czaja

Wojtek Czaja

Alert button

Decepticons: Corrupted Transformers Breach Privacy in Federated Learning for Language Models

Add code
Bookmark button
Alert button
Jan 29, 2022
Liam Fowl, Jonas Geiping, Steven Reich, Yuxin Wen, Wojtek Czaja, Micah Goldblum, Tom Goldstein

Figure 1 for Decepticons: Corrupted Transformers Breach Privacy in Federated Learning for Language Models
Figure 2 for Decepticons: Corrupted Transformers Breach Privacy in Federated Learning for Language Models
Figure 3 for Decepticons: Corrupted Transformers Breach Privacy in Federated Learning for Language Models
Figure 4 for Decepticons: Corrupted Transformers Breach Privacy in Federated Learning for Language Models
Viaarxiv icon

Robbing the Fed: Directly Obtaining Private Data in Federated Learning with Modified Models

Add code
Bookmark button
Alert button
Oct 25, 2021
Liam Fowl, Jonas Geiping, Wojtek Czaja, Micah Goldblum, Tom Goldstein

Figure 1 for Robbing the Fed: Directly Obtaining Private Data in Federated Learning with Modified Models
Figure 2 for Robbing the Fed: Directly Obtaining Private Data in Federated Learning with Modified Models
Figure 3 for Robbing the Fed: Directly Obtaining Private Data in Federated Learning with Modified Models
Figure 4 for Robbing the Fed: Directly Obtaining Private Data in Federated Learning with Modified Models
Viaarxiv icon

Adversarial Examples Make Strong Poisons

Add code
Bookmark button
Alert button
Jun 21, 2021
Liam Fowl, Micah Goldblum, Ping-yeh Chiang, Jonas Geiping, Wojtek Czaja, Tom Goldstein

Figure 1 for Adversarial Examples Make Strong Poisons
Figure 2 for Adversarial Examples Make Strong Poisons
Figure 3 for Adversarial Examples Make Strong Poisons
Figure 4 for Adversarial Examples Make Strong Poisons
Viaarxiv icon

Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release

Add code
Bookmark button
Alert button
Mar 05, 2021
Liam Fowl, Ping-yeh Chiang, Micah Goldblum, Jonas Geiping, Arpit Bansal, Wojtek Czaja, Tom Goldstein

Figure 1 for Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release
Figure 2 for Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release
Figure 3 for Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release
Figure 4 for Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release
Viaarxiv icon