Picture for Alexander Ziller

Alexander Ziller

Visual Privacy Auditing with Diffusion Models

Add code
Mar 12, 2024
Viaarxiv icon

Bounding Reconstruction Attack Success of Adversaries Without Data Priors

Add code
Feb 20, 2024
Viaarxiv icon

How Low Can You Go? Surfacing Prototypical In-Distribution Samples for Unsupervised Anomaly Detection

Add code
Dec 06, 2023
Figure 1 for How Low Can You Go? Surfacing Prototypical In-Distribution Samples for Unsupervised Anomaly Detection
Figure 2 for How Low Can You Go? Surfacing Prototypical In-Distribution Samples for Unsupervised Anomaly Detection
Figure 3 for How Low Can You Go? Surfacing Prototypical In-Distribution Samples for Unsupervised Anomaly Detection
Figure 4 for How Low Can You Go? Surfacing Prototypical In-Distribution Samples for Unsupervised Anomaly Detection
Viaarxiv icon

Reconciling AI Performance and Data Reconstruction Resilience for Medical Imaging

Add code
Dec 05, 2023
Figure 1 for Reconciling AI Performance and Data Reconstruction Resilience for Medical Imaging
Figure 2 for Reconciling AI Performance and Data Reconstruction Resilience for Medical Imaging
Figure 3 for Reconciling AI Performance and Data Reconstruction Resilience for Medical Imaging
Figure 4 for Reconciling AI Performance and Data Reconstruction Resilience for Medical Imaging
Viaarxiv icon

Bias-Aware Minimisation: Understanding and Mitigating Estimator Bias in Private SGD

Add code
Aug 23, 2023
Viaarxiv icon

Explainable 2D Vision Models for 3D Medical Data

Add code
Jul 13, 2023
Viaarxiv icon

Body Fat Estimation from Surface Meshes using Graph Neural Networks

Add code
Jul 13, 2023
Figure 1 for Body Fat Estimation from Surface Meshes using Graph Neural Networks
Figure 2 for Body Fat Estimation from Surface Meshes using Graph Neural Networks
Figure 3 for Body Fat Estimation from Surface Meshes using Graph Neural Networks
Figure 4 for Body Fat Estimation from Surface Meshes using Graph Neural Networks
Viaarxiv icon

Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy

Add code
Jul 08, 2023
Figure 1 for Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy
Figure 2 for Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy
Figure 3 for Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy
Figure 4 for Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy
Viaarxiv icon

Private, fair and accurate: Training large-scale, privacy-preserving AI models in radiology

Add code
Feb 03, 2023
Viaarxiv icon

How Do Input Attributes Impact the Privacy Loss in Differential Privacy?

Add code
Nov 18, 2022
Viaarxiv icon